Generic attacks on feistel networks with internal permutations

11Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we describe generic attacks on Feistel networks with internal permutations, instead of Feistel networks with internal functions as designed originally. By generic attacks, we mean that in these attacks the internal permutations are supposed to be random. Despite the fact that some real Feistel ciphers actually use internal permutations like Twofish, Camellia, or DEAL, these ciphers have not been studied much. We will see that they do not always behave like the original Feistel networks with round functions. More precisely, we will see that the attacks (known plaintext attacks or chosen plaintext attacks) are often less efficient, namely on all 3i rounds, i ε ℕ*. For a plaintext of size 2n bits, the complexity of the attacks will be strictly less than 22n when the number of rounds is less than or equal to 5. When the number k of rounds is greater, we also describe some attacks enabling to distinguish a k-round Feistel network generator from a random permutation generator. © 2009 Springer Berlin Heidelberg.

Cite

CITATION STYLE

APA

Treger, J., & Patarin, J. (2009). Generic attacks on feistel networks with internal permutations. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5580 LNCS, pp. 41–59). https://doi.org/10.1007/978-3-642-02384-2_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free