The related-key analysis of feistel constructions

10Citations
Citations of this article
31Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosenciphertext attacks, respectively. However, irrespective of the number of rounds, no Feistel construction can resist related-key attacks where the keys can be offset by a constant. In this paper we show that, under suitable reuse of round keys, security under related-key attacks can be provably attained. Our modification is simpler and more efficient than alternatives obtained using generic transforms, namely the PRG transform of Bellare and Cash (CRYPTO 2010) and its random-oracle analogue outlined by Lucks (FSE 2004). Additionally we formalize Luck’s transform and show that it does not always work if related keys are derived in an oracle-dependent way, and then prove it sound under appropriate restrictions.

Cite

CITATION STYLE

APA

Barbosa, M., & Farshim, P. (2015). The related-key analysis of feistel constructions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8540, pp. 265–284). Springer Verlag. https://doi.org/10.1007/978-3-662-46706-0_14

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free