Generic round-function-recovery attacks for feistel networks over small domains

4Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when the domain size of a branch (called) is small. We investigate round-function-recovery attacks. The best known attack so far is an improvement of Meet-In-The-Middle (MITM) attack by Isobe and Shibutani from ASIACRYPT2013 with optimal data complexity q = r N/2 and time complexity, (Formula presented) where is the round number in FN. We construct an algorithm with a surprisingly better complexity when is too low, based on partial exhaustive search. When the data complexity varies from the optimal to the one of a codebook attack q = N2our time complexity can reach (Formula presented). It crosses the complexity of the improved MITM for(Formula presented). We also estimate the lowest secure number of rounds depending on and the security goal. We show that the format-preserving-encryption schemes FF1 and FF3 standardized by NIST and ANSI cannot offer 128-bit security (as they are supposed to) for N ≤ 11 and N ≤ 17, respectively (the NIST standard only requires N ≥ 10), and we improve the results by Durak and Vaudenay from CR YPTO2017.

Cite

CITATION STYLE

APA

Durak, F. B., & Vaudenay, S. (2018). Generic round-function-recovery attacks for feistel networks over small domains. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10892 LNCS, pp. 440–458). Springer Verlag. https://doi.org/10.1007/978-3-319-93387-0_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free