The Security of Feistel Ciphers with Six Rounds or Less

被引:0
|
作者
机构
[1] Department of Mathematics,
[2] Technical University of Denmark,undefined
[3] Building 303,undefined
[4] DK-2800 Kgs. Lyngby,undefined
[5] Denmark lars@ramkilde.com,undefined
[6] www.ramkilde.com,undefined
来源
Journal of Cryptology | 2002年 / 15卷
关键词
Key words. Feistel ciphers, Luby—Rackoff permutations, Cryptanalysis, Data Encryption Standard.;
D O I
暂无
中图分类号
学科分类号
摘要
This paper considers the security of Feistel networks where the round functions are chosen at random from a family of 2k randomly chosen functions for any k . Also considered are the networks where the round functions are themselves permutations, since these have applications in practice. The constructions are attacked under the assumption that a key-recovery attack on one round function itself requires an exhaustive search over all 2k possible functions. Attacks are given on all three-, four-, five-, and six-round Feistel constructions and interesting bounds on their security level are obtained. In a chosen text scenario the key recovery attacks on the four-round constructions, the analogue to the super pseudorandom permutations in the Luby and Rackoff model, take roughly only the time of an exhaustive search for the key of one round. A side result of the presented attacks is that some constructions, which have been proved super pseudorandom in the model of Luby and Rackoff, do not seem to offer more security in our model than constructions which are not super pseudorandom.
引用
收藏
页码:207 / 222
页数:15
相关论文
共 50 条
  • [41] Towards the optimality of Feistel ciphers with substitution-permutation functions
    Kyoji Shibutani
    Andrey Bogdanov
    Designs, Codes and Cryptography, 2014, 73 : 667 - 682
  • [42] Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP
    Lallemand, Virginie
    Minier, Marine
    Rouquette, Loic
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 113 - 140
  • [43] On the strength of simply-iterated Feistel ciphers with whitening keys
    Onions, P
    TOPICS IN CRYPTOLOGY - CT-RAS 2001, PROCEEDINGS, 2001, 2020 : 63 - 69
  • [44] On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation
    Guo, Chun
    Lin, Dongdai
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT I, 2015, 9014 : 110 - 133
  • [45] SIPFA: Statistical Ineffective Persistent Faults Analysis on Feistel Ciphers
    Bagheri N.
    Sadeghi S.
    Ravi P.
    Bhasin S.
    Soleimany H.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2022, 2022 (03): : 367 - 390
  • [46] On Boomerang Attacks on Quadratic Feistel Ciphers New results on KATAN and Simon
    Bonnetain, Xavier
    Lallemand, Virginie
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (03) : 101 - 145
  • [47] Secure key-alternating Feistel ciphers without key schedule
    Shen, Yaobin
    Yan, Hailun
    Wang, Lei
    Lai, Xuejia
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (01)
  • [48] Secure key-alternating Feistel ciphers without key schedule
    Yaobin Shen
    Hailun Yan
    Lei Wang
    Xuejia Lai
    Science China Information Sciences, 2021, 64
  • [49] Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions
    Wei, Yuechuan
    Li, Ping
    Sun, Bing
    Li, Chao
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 105 - +
  • [50] BOUNDS FOR THE NUMBER OF ROUNDS WITH IMPOSSIBLE DIFFERENCES IN GENERALIZED FEISTEL SCHEMES
    Pudovkina, M. A.
    Toktarev, A. V.
    PRIKLADNAYA DISKRETNAYA MATEMATIKA, 2015, 27 (01): : 37 - 51