Security of Feistel Schemes with New and Various Tools
نویسندگان
چکیده
We combine the H Coe cients technique and the Coupling technique to improve security bounds of balanced Feistel schemes. For q queries and round functions of n−bits to n−bits, we nd that the CCA Security of 4 + 2r rounds Feistel schemes is upperbounded by 2q r+3 ( 4q 2n ) r+1 2 + q(q−1) 2·22n . This divides by roughly 1.5 the number of needed rounds for a given CCA Security, compared to the previous results of Hoang and Rogaway [HR10] who found an advantage of 2q r+1 ( 4q 2n )r for 6r − 1 rounds Feistel schemes . Independently of this result, using a new theorem on H Coe cients, we compose 6 rounds Feistel schemes to upperbound the CCA security of 6r rounds Feistel schemes: ( 8q 2n )r + q(q−1) 2·22n when q ≤ 2 n 67n .
منابع مشابه
Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities
In this paper we will study 2 security results “above the birthday bound” related to secret key cryptographic problems. 1. The classical problem of the security of 4, 5, 6 rounds balanced Random Feistel Schemes. 2. The problem of the security of unbalanced Feistel Schemes with contracting functions from 2n bits to n bits. This problem was studied by Naor and Reingold [14] and by [32] with a pro...
متن کاملNew Results on the Pseudorandomness of Some Blockcipher Constructions
In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various levels of the MISTY blockcipher which allows to derive a 2n-bit permutation from several n-bit permutations, and a slightly different construction named the R-scheme. We obtain pseudorandomness and super-pseudorandomness...
متن کاملExtended Generalized Feistel Networks Using Matrix Representation
While Generalized Feistel Networks have been widely studied in the literature as a building block of a block cipher, we propose in this paper a unified vision to easily represent them through a matrix representation. We then propose a new class of such schemes called Extended Generalized Feistel Networks well suited for cryptographic applications. We instantiate those proposals into two particu...
متن کاملA New Ring-Based SPHF and PAKE Protocol On Ideal Lattices
emph{ Smooth Projective Hash Functions } ( SPHFs ) as a specific pattern of zero knowledge proof system are fundamental tools to build many efficient cryptographic schemes and protocols. As an application of SPHFs, emph { Password - Based Authenticated Key Exchange } ( PAKE ) protocol is well-studied area in the last few years. In 2009, Katz and Vaikuntanathan described the first lattice-based ...
متن کاملOn the Security of Extended Generalized Feistel Networks
In this paper, we analyze the security claims of Extended Generalized Feistel Networks (EGFNs) schemes proposed by Berger et al [1]. We provide impossible differentials for 10 rounds of EGFNs with 16 branches which add up one round to the claim of 9 rounds in the impossible differential trail. Therefore, impossible differential trail covers 10 rounds for the EGFNs scheme, which is the best resu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012