Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when the domain size of a branch (called) is small. We investigate round-function-recovery attacks. The best known attack so far is an improvement of Meet-In-The-Middle (MITM) attack by Isobe and Shibutani from ASIACRYPT2013 with optimal data complexity q = r N/2 and time complexity, (Formula presented) where is the round number in FN. We construct an algorithm with a surprisingly better complexity when is too low, based on partial exhaustive search. When the data complexity varies from the optimal to the one of a codebook attack q = N2our time complexity can reach (Formula presented). It crosses the complexity of the improved MITM for(Formula presented). We also estimate the lowest secure number of rounds depending on and the security goal. We show that the format-preserving-encryption schemes FF1 and FF3 standardized by NIST and ANSI cannot offer 128-bit security (as they are supposed to) for N ≤ 11 and N ≤ 17, respectively (the NIST standard only requires N ≥ 10), and we improve the results by Durak and Vaudenay from CR YPTO2017.
CITATION STYLE
Durak, F. B., & Vaudenay, S. (2018). Generic round-function-recovery attacks for feistel networks over small domains. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10892 LNCS, pp. 440–458). Springer Verlag. https://doi.org/10.1007/978-3-319-93387-0_23
Mendeley helps you to discover research relevant for your work.