It is well known that the classical three- and four-round Feistel constructions are provably secure under chosen-plaintext and chosenciphertext attacks, respectively. However, irrespective of the number of rounds, no Feistel construction can resist related-key attacks where the keys can be offset by a constant. In this paper we show that, under suitable reuse of round keys, security under related-key attacks can be provably attained. Our modification is simpler and more efficient than alternatives obtained using generic transforms, namely the PRG transform of Bellare and Cash (CRYPTO 2010) and its random-oracle analogue outlined by Lucks (FSE 2004). Additionally we formalize Luck’s transform and show that it does not always work if related keys are derived in an oracle-dependent way, and then prove it sound under appropriate restrictions.
CITATION STYLE
Barbosa, M., & Farshim, P. (2015). The related-key analysis of feistel constructions. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8540, pp. 265–284). Springer Verlag. https://doi.org/10.1007/978-3-662-46706-0_14
Mendeley helps you to discover research relevant for your work.