Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper applies linear cryptanalysis to FEAL and describes the experimental results of attacking FEAL-8 by linear cryptanalysis. The following points are important in linear cryptanalysis to reduce the processing amount and memory size in the attack: 1) to find linear expressions with as high a deviation as possible, and 2) to reduce the number of effective key bits and effective text bits. We have succeeded in attacking FEAL-8 in about 1 hour on a low-end workstation (SPARC-station 10 Model 30). We have confirmed that the entire set of subkeys of FEAL-8 can be derived from 2^<25> known plaintexts with a success rate of over 70%, and from 2^<26> known plaintexts with a success rate of almost 100%.
- 社団法人電子情報通信学会の論文
- 1998-01-25
著者
-
Matsui Mika
Graduate School Of Science And Engineering Yamaguchi University
-
AOKI Kazumaro
NTT Laboratories
-
OHTA Kazuo
NTT Laboratories
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
AOKI Kazumaro
NTT Communications Corporation
-
MATSUI Mitsuru
Mitsubishi Electric Corporation
-
Aoki K
Ntt Corp. Yokosuka‐shi Jpn
-
MORIAI Shiho
Information & Communication Security Project, Telecommunications Advancement Organization of Japan
-
Ohta K
Univ. Electro‐communications Chofu‐shi Jpn
-
Matsui M
Graduate School Of Science And Engineering Yamaguchi University
関連論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Biopathways representation and simulation on hybrid functional Petri net
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability (Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- Performance Analysis and Parallel Implementation of Dedicated Hash Functions on Pentium III(Special Section on Cryptography and Information Security)
- FOREWORD (Special Section on Cryptography and Information Security)
- Modeling and Simulation of Fission Yeast Cell Cycle on Hybrid Functional Petri Net(Hybrid Systems)(Concurrent Systems and Hybrid Systems)
- On Applicability of Linear Cryptanalysis to DES-like Cryptosystems : LOKI89, LOKI91 and s^2 DES
- Optimized Software Implementations of E2(Special Section on Cryptography and Information Security)
- Special Section on Cryptography and Information Security
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- The Best Differential Characteristic Search of FEAL (Special Section on Cryptography and Information Security)
- Practical Evaluation of Security against Generalized Interpolation Attack(Special Section on Cryptography and Information Security)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash (Special Section on Cryptography and Information Security)
- Collision Search of a Hash Function by Using Random Mapping (Special Section on Cryptography and Information Security)
- Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security)
- Security of the Extended Fiat-Shamir Schemes (Special Section on Cryptography and Information Security)