Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
スポンサーリンク
概要
- 論文の詳細を見る
We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21, 13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgård domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme.
著者
-
Hong Seokhie
Center For Information Security Technologies (cist) Korea University
-
SUNG Jaechul
Department of Mathematics, University of Seoul
-
KWON Daesung
The Attacked Institute of ETRI
-
MOON Dukjae
Center for Information Security Technologies (CIST), Korea University
-
KANG HyungChul
Center for Information Security Technologies (CIST), Korea University
-
HONG Deukjo
The Attacked Institute of ETRI
関連論文
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function