In this paper we will prove the Conjecture 8.1. of [7]. We call it "Conjecture Pi ⊕ Pj". It is a purely combinatorial conjecture that has however some cryptographic consequence. For example, from this result we can improve the proven security bounds on random Feistel schemes with 5 rounds: we will prove that no adaptive chosen plaintext/chosen ciphertext attack can exist on 5 rounds Random Feistel Schemes when m ≪ 2n. This result reach the optimal bound of security against an adversary with unlimited computing power (but limited by m queries) with the minimum number of rounds. It solves the last case of a famous open problem (cf [8]). © Springer-Verlag Berlin Heidelberg 2006.
CITATION STYLE
Patarin, J. (2006). On linear systems of equations with distinct variables and small block size proof of a combinatorial Conjecture with applications to random feistel schemes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3935 LNCS, pp. 299–321). https://doi.org/10.1007/11734727_25
Mendeley helps you to discover research relevant for your work.