Back to Search
Start Over
Differential attacks on generalized Feistel schemes
- Source :
- 12th International Conference on Cryptology and Network Security, CANS 2013, 12th International Conference on Cryptology and Network Security, CANS 2013, Nov 2013, Paraty, Brazil. pp.1-19, ⟨10.1007/978-3-319-02937-5_1⟩, Cryptology and Network Security ISBN: 9783319029368, CANS
- Publication Year :
- 2013
- Publisher :
- HAL CCSD, 2013.
-
Abstract
- International audience; While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and alternating Feistel schemes, as defined in [8], have not been systematically investigated. These generalized Feistel schemes are used in well known block cipher networks that use generalized Feistel schemes CAST-256 (type-1), RC-6 (type-2), MARS (type-3) and BEAR/LION (alternating). Also, type-1 and type-2 Feistel schemes are respectively used in the construction of the hash functions Lesamnta and SHAvite - 3512.In this paper, we give our best Known Plaintext Attacks and non-adaptive Chosen Plaintext Attacks on these schemes. We determine the maximal number of rounds that we can attack when we want to distinguish a permutation produced by the scheme from a permutation chosen randomly in the set of permutations. © Springer International Publishing 2013.
- Subjects :
- Discrete mathematics
Hash function
Generalized Feistel schemes
Generic attacks on encryption schemes
Plaintext
0102 computer and information sciences
02 engineering and technology
01 natural sciences
Set (abstract data type)
Permutation
010201 computation theory & mathematics
Scheme (mathematics)
Known-plaintext attack
Block ciphers
0202 electrical engineering, electronic engineering, information engineering
020201 artificial intelligence & image processing
Differential (infinitesimal)
[MATH]Mathematics [math]
Block cipher
Mathematics
Subjects
Details
- Language :
- English
- ISBN :
- 978-3-319-02936-8
- ISBNs :
- 9783319029368
- Database :
- OpenAIRE
- Journal :
- 12th International Conference on Cryptology and Network Security, CANS 2013, 12th International Conference on Cryptology and Network Security, CANS 2013, Nov 2013, Paraty, Brazil. pp.1-19, ⟨10.1007/978-3-319-02937-5_1⟩, Cryptology and Network Security ISBN: 9783319029368, CANS
- Accession number :
- edsair.doi.dedup.....2755908b61a370f0a47e96a402998741
- Full Text :
- https://doi.org/10.1007/978-3-319-02937-5_1⟩