23
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective

      Preprint

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          We initiate the provable related-key security treatment for models of \emph{practical} Feistel ciphers. In detail, we consider Feistel networks with four whitening keys \(\wf_i(k)\) (\(i=0,1,2,3\)) and round-functions of the form \(f(\ga_i(k)\oplus X)\), where \(k\) is the main-key, \(\wf_i\) and \(\ga_i\) are efficient transformations, and \(f\) is a \emph{public} ideal function or permutation that the adversary is allowed to query. We investigate conditions on the key-schedules that are sufficient for security against XOR-induced related-key attacks up to \(2^{n/2}\) adversarial queries. When the key-schedules are \emph{non-linear}, we prove security for 4 rounds. When only \emph{affine} key-schedules are used, we prove security for 6 rounds. These also imply secure tweakable Feistel ciphers in the Random Oracle model. By shuffling the key-schedules, our model unifies both the DES-like structure (known as \emph{Feistel-2} scheme in the cryptanalytic community, a.k.a. \emph{key-alternating Feistel} due to Lampe and Seurin, FSE 2014) and the Lucifer-like model (previously analyzed by Guo and Lin, TCC 2015). This allows us to derive concrete implications on these two (more common) models, and helps understanding their differences---and further understanding the related-key security of Feistel ciphers.

          Related collections

          Most cited references13

          • Record: found
          • Abstract: not found
          • Article: not found

          New types of cryptanalytic attacks using related keys

          Eli Biham (1994)
            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            Related-Key Cryptanalysis of the Full AES-192 and AES-256

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)

                Bookmark

                Author and article information

                Journal
                17 October 2018
                Article
                1810.07428
                0e157369-11dc-46a4-8393-878795eab65e

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                cs.CR

                Security & Cryptology
                Security & Cryptology

                Comments

                Comment on this article