Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
Nyberg and Knudsen proved that the maximum average of differential probability (ADP_<max>) and the maximum average of linear probability (ALP_<max>) of Feistel cipher with over 4 rounds can be evaluated as ADP_<max> ≦ 2DCP^2_<max> and ALP_<max> ≦ 2LCP^2_<max> using the maximum of differential characteristic probability (DCP_<max>) and the maximum of linear characteristic probability (LCP_<max>) per round. This paper shows ADP_<max> ≦ DCP^2_<max> and ALP_<max> ≦ LCP^2_<max> if the F function is a bijection and the Feistel cipher has more than 3 rounds. The results prove that Feistel ciphers are stronger against differential and linear cryptanalyses than previously thought. Combining this result with that of Luby and Rackoff, the implication is that the 3-round Feistel cipher could be used as a building block cipher for the construction of provable secure block cipher algorithm.
- 1997-01-25
著者
-
AOKI Kazumaro
NTT Laboratories
-
OHTA Kazuo
NTT Laboratories
-
AOKI Kazumaro
NTT Communications Corporation
-
Aoki K
Ntt Corp. Yokosuka‐shi Jpn
-
Ohta K
Univ. Electro‐communications Chofu‐shi Jpn
関連論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability (Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- Optimized Software Implementations of E2(Special Section on Cryptography and Information Security)
- The Best Differential Characteristic Search of FEAL (Special Section on Cryptography and Information Security)
- Practical Evaluation of Security against Generalized Interpolation Attack(Special Section on Cryptography and Information Security)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash (Special Section on Cryptography and Information Security)
- Collision Search of a Hash Function by Using Random Mapping (Special Section on Cryptography and Information Security)
- Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security)
- Security of the Extended Fiat-Shamir Schemes (Special Section on Cryptography and Information Security)