The security of Feistel ciphers with six rounds or less (Q1849601): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Import recommendations run Q6534273
 
(One intermediate revision by one other user not shown)
Property / DOI
 
Property / DOI: 10.1007/s00145-002-9839-y / rank
Normal rank
 
Property / DOI
 
Property / DOI: 10.1007/S00145-002-9839-Y / rank
 
Normal rank
Property / Recommended article
 
Property / Recommended article: Q4526982 / rank
 
Normal rank
Property / Recommended article: Q4526982 / qualifier
 
Similarity Score: 0.8683424
Amount0.8683424
Unit1
Property / Recommended article: Q4526982 / qualifier
 
Property / Recommended article
 
Property / Recommended article: Luby-Rackoff Ciphers from Weak Round Functions? / rank
 
Normal rank
Property / Recommended article: Luby-Rackoff Ciphers from Weak Round Functions? / qualifier
 
Similarity Score: 0.8637825
Amount0.8637825
Unit1
Property / Recommended article: Luby-Rackoff Ciphers from Weak Round Functions? / qualifier
 
Property / Recommended article
 
Property / Recommended article: About Feistel Schemes with Six (or More) Rounds / rank
 
Normal rank
Property / Recommended article: About Feistel Schemes with Six (or More) Rounds / qualifier
 
Similarity Score: 0.85423386
Amount0.85423386
Unit1
Property / Recommended article: About Feistel Schemes with Six (or More) Rounds / qualifier
 
Property / Recommended article
 
Property / Recommended article: Q4434898 / rank
 
Normal rank
Property / Recommended article: Q4434898 / qualifier
 
Similarity Score: 0.8317635
Amount0.8317635
Unit1
Property / Recommended article: Q4434898 / qualifier
 
Property / Recommended article
 
Property / Recommended article: Q4474175 / rank
 
Normal rank
Property / Recommended article: Q4474175 / qualifier
 
Similarity Score: 0.82922626
Amount0.82922626
Unit1
Property / Recommended article: Q4474175 / qualifier
 
Property / Recommended article
 
Property / Recommended article: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme / rank
 
Normal rank
Property / Recommended article: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme / qualifier
 
Similarity Score: 0.8275706
Amount0.8275706
Unit1
Property / Recommended article: Luby-Rackoff revisited: on the use of permutations as inner functions of a Feistel scheme / qualifier
 
Property / Recommended article
 
Property / Recommended article: On the construction of pseudorandom permutations: Luby-Rackoff revisited / rank
 
Normal rank
Property / Recommended article: On the construction of pseudorandom permutations: Luby-Rackoff revisited / qualifier
 
Similarity Score: 0.82601637
Amount0.82601637
Unit1
Property / Recommended article: On the construction of pseudorandom permutations: Luby-Rackoff revisited / qualifier
 
Property / Recommended article
 
Property / Recommended article: Feistel Networks Made Public, and Applications / rank
 
Normal rank
Property / Recommended article: Feistel Networks Made Public, and Applications / qualifier
 
Similarity Score: 0.80954635
Amount0.80954635
Unit1
Property / Recommended article: Feistel Networks Made Public, and Applications / qualifier
 
Property / Recommended article
 
Property / Recommended article: Upper Bounds for the Security of Several Feistel Networks / rank
 
Normal rank
Property / Recommended article: Upper Bounds for the Security of Several Feistel Networks / qualifier
 
Similarity Score: 0.8077526
Amount0.8077526
Unit1
Property / Recommended article: Upper Bounds for the Security of Several Feistel Networks / qualifier
 
Property / Recommended article
 
Property / Recommended article: New Results on the Pseudorandomness of Some Blockcipher Constructions / rank
 
Normal rank
Property / Recommended article: New Results on the Pseudorandomness of Some Blockcipher Constructions / qualifier
 
Similarity Score: 0.7967518
Amount0.7967518
Unit1
Property / Recommended article: New Results on the Pseudorandomness of Some Blockcipher Constructions / qualifier
 

Latest revision as of 19:56, 27 January 2025

scientific article
Language Label Description Also known as
English
The security of Feistel ciphers with six rounds or less
scientific article

    Statements

    The security of Feistel ciphers with six rounds or less (English)
    0 references
    0 references
    1 December 2002
    0 references
    \textit{M. Luby} and \textit{C. Rackoff} [SIAM J. Comput. 17, 373-386 (1988; Zbl 0644.94018)] showed a method for constructing pseudorandom permutations from pseudorandom functions by using three or four rounds of Feistel networks. The security of their construction as well as others suggested later is measured in terms of the complexity of distinguishing the outputs from the outputs of a truly random function. In this paper, a different approach is proposed. Namely, it is assumed that the round functions in the Feistel network are chosen at random from just a subset of \(2^k\) randomly chosen functions instead of the set of all functions. As each round function can be specified by a \(k\)-bit key, the security of the resulting permutations is then investigated as the complexity of finding all the keys of the cipher with \(r\) rounds. Using this approach attacks on all three-, four-, five-, and six-round Feistel constructions, where round functions are either functions or permutations, are given and their complexity analyzed. Also it is shown that a construction which is super pseudorandom in the Luby-Rackoff model is not necessarily stronger than a construction which is pseudorandom when translated into the model proposed. Finally, using the DES as the round function in a Feistel construction is briefly discussed.
    0 references
    Feistel ciphers
    0 references
    pseudorandom permutations
    0 references
    pseudorandom functions
    0 references
    Luby-Rackoff permutations
    0 references
    cryptanalysis
    0 references
    0 references

    Identifiers