Complementing Feistel ciphers

6Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we propose related-key differential distinguishers based on the complementation property of Feistel ciphers. We show that with relaxed requirements on the complementation, i.e. the property does not have to hold for all keys and the complementation does not have to be on all bits, one can obtain a variety of distinguishers. We formulate criteria sufficient for attacks based on the complementation property. To stress the importance of our findings we provide analysis of the full-round primitives: - For the hash mode of Camellia-128 without FL, FL-1 layers, differential multicollisions with 2112 time. - For GOST, practical recovery of the full key with 31 related keys and 238 time/data. © 2014 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Biryukov, A., & Nikolić, I. (2014). Complementing Feistel ciphers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8424 LNCS, pp. 3–18). Springer Verlag. https://doi.org/10.1007/978-3-662-43933-3_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free