Security of Random Feistel Schemes with 5 or More Rounds

نویسنده

  • Jacques Patarin
چکیده

We study cryptographic attacks on random Feistel schemes. We denote by m the number of plaintext/ciphertext pairs, and by k the number of rounds. In their famous paper [3], M. Luby and C. Rackoff have completely solved the cases m ¿ 2: the schemes are secure against all adaptive chosen plaintext attacks (CPA-2) when k ≥ 3 and against all adaptive chosen plaintext and chosen ciphertext attacks (CPCA-2) when k ≥ 4 (for this second result a proof is given in [9]). In this paper we study the cases m ¿ 2. We will use the “coefficients H technique” of proof to analyze known plaintext attacks (KPA), adaptive or non-adaptive chosen plaitext attacks (CPA-1 and CPA-2) and adaptive or non-adaptive chosen plaitext and chosen ciphertext attacks (CPCA-1 and CPCA-2). In the first part of this paper, we will show that when m ¿ 2 the schemes are secure against all KPA when k ≥ 4, against all CPA-2 when k ≥ 5 and against all CPCA-2 attacks when k ≥ 6. This solves an open problem of [1], [14], and it improves the result of [14] (where more rounds were needed and m ¿ 2n(1−ε) was obtained instead of m ¿ 2). The number 5 of rounds is minimal since CPA-2 attacks on 4 rounds are known when m ≥ O(2) (see [1], [10]). Furthermore, in all these cases we have always obtained an explicit majoration for the distinguishing probability. In the second part of this paper, we present some improved generic attacks. For k = 5 rounds, we present a KPA with m ' 2 and a non-adaptive chosen plaintext attack (CPA1) with m ' 2. For k ≥ 7 rounds we also show some improved attacks against random Feistel generators (with more than one permutation to analyze and ≥ 2 computations).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Luby-Rackoff: 7 Rounds are Enough for 2 Security

In [3] M. Luby and C. Rackoff have proved that 3-round random Feistel schemes are secure against all adaptative chosen plaintext attacks when the number of queries is m ¿ 2. Moreover, 4-round random Feistel schemes are also secure against all adaptative chosen plaintext and chosen ciphertext attacks when m ¿ 2. It was shown later that these bounds are tight for 3 and 4 rounds (see [9] or [1]). ...

متن کامل

Security of balanced and unbalanced Feistel Schemes with Linear Non Equalities

In this paper we will study 2 security results “above the birthday bound” related to secret key cryptographic problems. 1. The classical problem of the security of 4, 5, 6 rounds balanced Random Feistel Schemes. 2. The problem of the security of unbalanced Feistel Schemes with contracting functions from 2n bits to n bits. This problem was studied by Naor and Reingold [14] and by [32] with a pro...

متن کامل

Random Feistel Schemes : security in m 2 3 n / 4 for ≥ 6 rounds

This paper is a continuation of the work initiated in [2] by M. Luby andC. Rackoff on Feistel schemes used as pseudorandom permutation generators.The aim of this paper is to study the qualitative improvements of “strong pseu-dorandomness” of the Luby-Rackoff construction when the number of roundsincrease. We prove that for 6 rounds (or more), the success probability of the<l...

متن کامل

Generic Attacks on Feistel Schemes

Let A be a Feistel scheme with 5 rounds from 2n bits to 2n bits. In the present paper we show that for most such schemes A: 1. It is possible to distinguish A from a random permutation from 2n bits to 2n bits after doing at most O(2n) computations with O(2n) non-adaptive chosen plaintexts. 2. It is possible to distinguish A from a random permutation from 2n bits to 2n bits after doing at most O...

متن کامل

Security of Feistel Schemes with New and Various Tools

We combine the H Coe cients technique and the Coupling technique to improve security bounds of balanced Feistel schemes. For q queries and round functions of n−bits to n−bits, we nd that the CCA Security of 4 + 2r rounds Feistel schemes is upperbounded by 2q r+3 ( 4q 2n ) r+1 2 + q(q−1) 2·22n . This divides by roughly 1.5 the number of needed rounds for a given CCA Security, compared to the pre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004