The Security of Feistel Ciphers with Six Rounds or Less

被引:0
|
作者
机构
[1] Department of Mathematics,
[2] Technical University of Denmark,undefined
[3] Building 303,undefined
[4] DK-2800 Kgs. Lyngby,undefined
[5] Denmark lars@ramkilde.com,undefined
[6] www.ramkilde.com,undefined
来源
Journal of Cryptology | 2002年 / 15卷
关键词
Key words. Feistel ciphers, Luby—Rackoff permutations, Cryptanalysis, Data Encryption Standard.;
D O I
暂无
中图分类号
学科分类号
摘要
This paper considers the security of Feistel networks where the round functions are chosen at random from a family of 2k randomly chosen functions for any k . Also considered are the networks where the round functions are themselves permutations, since these have applications in practice. The constructions are attacked under the assumption that a key-recovery attack on one round function itself requires an exhaustive search over all 2k possible functions. Attacks are given on all three-, four-, five-, and six-round Feistel constructions and interesting bounds on their security level are obtained. In a chosen text scenario the key recovery attacks on the four-round constructions, the analogue to the super pseudorandom permutations in the Luby and Rackoff model, take roughly only the time of an exhaustive search for the key of one round. A side result of the presented attacks is that some constructions, which have been proved super pseudorandom in the model of Luby and Rackoff, do not seem to offer more security in our model than constructions which are not super pseudorandom.
引用
收藏
页码:207 / 222
页数:15
相关论文
共 50 条
  • [31] A related key attack on the feistel type block ciphers
    Computer Engineering Department, Sharif University of Technology, P. O. Box 11155-8639, Azadi Avenue, 14588 Tehran, Iran
    不详
    Int. J. Netw. Secur., 2009, 3 (221-226): : 221 - 226
  • [32] Generalized Feistel Ciphers for Efficient Prime Field Masking
    Grassi, Lorenzo
    Masure, Loic
    Meaux, Pierrick
    Moos, Thorben
    Standaert, Francois-Xavier
    ADVANCES IN CRYPTOLOGY, PT III, EUROCRYPT 2024, 2024, 14653 : 188 - 220
  • [33] Generalized Feistel Structures Based on Tweakable Block Ciphers
    Nakaya, Kazuki
    Iwata, Tetsu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (04) : 24 - 91
  • [34] POSTER: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers
    Ozdemir, Betul Askin
    Beyne, Tim
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3621 - 3623
  • [35] Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
    Laskari, E. C.
    Meletiou, G. C.
    Stamatiou, Y. C.
    Vrahatis, M. N.
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 184 (01) : 63 - 72
  • [36] BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
    Arghya Bhattacharjee
    Ritam Bhaumik
    Avijit Dutta
    Mridul Nandi
    Anik Raychaudhuri
    Designs, Codes and Cryptography, 2024, 92 (1) : 13 - 49
  • [37] BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
    Bhattacharjee, Arghya
    Bhaumik, Ritam
    Dutta, Avijit
    Nandi, Mridul
    Raychaudhuri, Anik
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (01) : 13 - 49
  • [38] Towards the optimality of Feistel ciphers with substitution-permutation functions
    Shibutani, Kyoji
    Bogdanov, Andrey
    DESIGNS CODES AND CRYPTOGRAPHY, 2014, 73 (02) : 667 - 682
  • [39] PROPERTIES OF FEISTEL'S CIPHERS RELATIVE TO TWO WREATH PRODUCTS
    Pudovkina, M. A.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2008, 2 (02): : 58 - 61
  • [40] Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK
    Zhang, Yingjie
    Lyu, Lijun
    Qiao, Kexin
    Zhang, Zhiyu
    Sun, Siwei
    Hu, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 147 - 167