Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.6.1261

Meet-in-the-Middle Attacks on Generalized Feistel Networks  

Sung, Jaechul (Department of Mathematics, University of Seoul)
Abstract
Feistel Networks are one of the most well-known schemes to design block ciphers. Generalized Feistel Networks are used to construct only block ciphers but also hash functions. Many generic attacks on Feistel schemes have been studied. Among these attacks, recently proposed meet-in-the-middle attacks are one of the most effective attacks. In this paper, we analyze the security of meet-in-the-middle attacks on generalized Feistel Networks.
Keywords
Block Ciphers; Generalized Feistel Networks; Meet-In-The-Middle; Generic Attacks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Biham and A. Shamir, "Differential Cryptanalysis of DES-like Cryptosystem," Journal of Cryptology, vol. 4, no. 1, pp. 3-72, 1991.   DOI
2 K. Nyberg and L. R. Knudsen, "Provable security against differential cryptanalysis," Journal of Cryptology , vol. 8, no. 1, pp. 27-37, 1995.   DOI
3 J. Daemen, L. R. Knudsen, and V. Rijmen, "The block cipher square," FSE'97, LNCS 1267, pp. 149-165, 1997.
4 J. Patarin, "Generic attacks on Feistel schemes," ASIACRYPT'01, LNCS 2248, pp. 222-238, 2001.
5 I. Dinur, O. Dunkelmann, N. Keller, and A. Shamir, "New attacks on Feistel structures with improved memory complexities," CRYTPO'15, LNCS 9215, pp. 433-454, 2015.
6 J. Guo, J. Jean, I. Nikolic, and Y. Sasaki, "Extended meet-in-the-middle attacks on some Feistel constructions," Designs, Codes and Cryptography, vol. 80, no. 3, pp. 587-618, 2016.   DOI
7 J. Guo, J. Jean, I. Nikolic, and Y. Sasaki, "Meet-in-the-middle attacks on generic Feistel constructions," ASIACRYPT'14, LNCS 8873, pp. 439-457, 2014.
8 V. Hoang and P. Rogaway, "On Generalized Feistel networks," CRYTPO'10, LNCS 6223, pp. 613-630, 2010.
9 V. Nachef, E.Volte, and J. Patarin, "Differential attacks on generalized Feistel schemes," CANS'13, LNCS 8257, pp. 1-19, 2013.
10 A. Bogdanov and K,Shibutani, "Generalized Feistel networks revisted," Designs, Codes and Cryptography, vol. 66, no. 1, pp. 75-97, 2013.   DOI
11 K. Nyberg, "Generalized Feistel Networks," ASIACRYPT'96, LNCS 1163, pp. 491-104, 1996.
12 H. Feistel, W. Notz, and J. Smith, "Some cryptographic techniques for machine-to-machine data communications," Proc of the IEEE, vol. 63, pp. 1545-1554, 1975.   DOI
13 M. Luby and C. Rackoff, "How to construct pseudorandom permutations from pseudorandom functions," SIAM Journal Computing, vol. 17, no. 2, pp. 373-386, 1988.   DOI
14 M. Naor and O. Reingold, "On the construction of pseudorandom permutations : Luby-Rackoff revisited," Journal of Cryptology, vol. 12, no. 1, pp. 29-66, 1999.   DOI
15 Y. Zheng, T. Matsumoto, and H, Imai, "On the construction of block ciphers provably secure and not relying on any unproved hypotheses," CRYTPO'89, LNCS 435, pp. 461-480, 1989.