Back to Search Start Over

Differential attacks on generalized Feistel schemes

Authors :
Emmanuel Volte
Jacques Patarin
Valérie Nachef
Parallélisme, Réseaux, Systèmes, Modélisation (PRISM)
Université de Versailles Saint-Quentin-en-Yvelines (UVSQ)-Centre National de la Recherche Scientifique (CNRS)
Source :
12th International Conference on Cryptology and Network Security, CANS 2013, 12th International Conference on Cryptology and Network Security, CANS 2013, Nov 2013, Paraty, Brazil. pp.1-19, ⟨10.1007/978-3-319-02937-5_1⟩, Cryptology and Network Security ISBN: 9783319029368, CANS
Publication Year :
2013
Publisher :
HAL CCSD, 2013.

Abstract

International audience; While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and alternating Feistel schemes, as defined in [8], have not been systematically investigated. These generalized Feistel schemes are used in well known block cipher networks that use generalized Feistel schemes CAST-256 (type-1), RC-6 (type-2), MARS (type-3) and BEAR/LION (alternating). Also, type-1 and type-2 Feistel schemes are respectively used in the construction of the hash functions Lesamnta and SHAvite - 3512.In this paper, we give our best Known Plaintext Attacks and non-adaptive Chosen Plaintext Attacks on these schemes. We determine the maximal number of rounds that we can attack when we want to distinguish a permutation produced by the scheme from a permutation chosen randomly in the set of permutations. © Springer International Publishing 2013.

Details

Language :
English
ISBN :
978-3-319-02936-8
ISBNs :
9783319029368
Database :
OpenAIRE
Journal :
12th International Conference on Cryptology and Network Security, CANS 2013, 12th International Conference on Cryptology and Network Security, CANS 2013, Nov 2013, Paraty, Brazil. pp.1-19, ⟨10.1007/978-3-319-02937-5_1⟩, Cryptology and Network Security ISBN: 9783319029368, CANS
Accession number :
edsair.doi.dedup.....2755908b61a370f0a47e96a402998741
Full Text :
https://doi.org/10.1007/978-3-319-02937-5_1⟩