Generic Attacks on Misty Schemes
نویسندگان
چکیده
Misty schemes are classic cryptographic schemes used to construct pseudo-random permutations from 2n bits to 2n bits by using d pseudo-random permutations from n bits to n bits. These d permutations will be called the “internal” permutations, and d is the number of rounds of the Misty scheme. Misty schemes are important from a practical point of view since for example, the Kasumi algorithm based on Misty schemes has been adopted as the standard blockcipher in the third generation mobile systems. In this paper we describe the best known “generic” attacks on Misty schemes, i.e. attacks when the internal permutations do not have special properties, or are randomly chosen. We describe known plaintext attacks (KPA), non-adaptive chosen plaintext attacks (CPA-1) and adaptive chosen plaintext and ciphertext attacks (CPCA-2) against these schemes. Some of these attacks were previously known, some are new. One important result of this paper is that we will show that when d = 5 rounds, there exist such attacks with a complexity strictly less than 2. Consequently, at least 6 rounds are necessary to avoid these generic attacks on Misty schemes. When d ≥ 6 we also describe some attacks on Misty generators, i.e. attacks where more than one Misty permutation is required.
منابع مشابه
Differential Attacks on Generalized Feistel Schemes
While generic attacks on classical Feistel schemes and unbalanced Feistel schemes have been studied a lot, generic attacks on several generalized Feistel schemes like type-1, type-2 and type-3 and Alternating Feistel schemes, as defined in [6], have not been systematically investigated. This is the aim of this paper. We give our best Known Plaintext Attacks and non-adaptive Chosen Plaintext Att...
متن کاملOn Pseudo Randomness from Block Ciphers
MISTY is a data encryption algorithm recently proposed by M. Matsui from Mitsubishi. An important property of MISTY is that, in terms of theoretically provable resistance against linear cryptanalysis which along with differential cryptanalysis is the most powerful cryptanalytic attack known to date, it is twice as secure as the Data Encryption Standard or DES. This property can be attributed to...
متن کاملGeneric Attacks on Unbalanced Feistel Schemes with Contracting Functions
In this paper, we describe generic attacks on unbalanced Feistel schemes with contracting functions. These schemes are used to construct pseudo-random permutations from kn bits to kn bits by using d pseudo-random functions from (k − 1)n bits to n bits. We describe known plaintext attacks (KPA) and non-adaptive chosen plaintext attacks (CPA-1) against these schemes with less than 2 plaintext/cip...
متن کاملOn non-pseudorandomness from block ciphers with provable immunity
0 On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis Abstract: Weakness of a block cipher, which has provable immunity against linear cryptanalysis, is investigated. To this end, the round transformation used in MISTY, which is a data encryption algorithm recently proposed by M. Matsui from Mitsubishi Electric Corporation, is compared to the round tra...
متن کاملGeneric Attacks on Alternating Unbalanced Feistel Schemes
Generic attacks against classical (balanced) Feistel schemes, unbalanced Feistel schemes with contracting functions and unbalanced Feistel schemes with expanding functions have been studied in [12], [4], [15], [16]. In this paper we study schemes where we use alternatively contracting random functions and expanding random functions. We name these schemes “Alternating Unbalanced Feistel Schemes”...
متن کامل