About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Journal article

The Security of Feistel Ciphers with Six Rounds or Less

From

Department of Mathematics, Technical University of Denmark1

This paper considers the security of Feistel networks where the round functions are chosen at random from a family of 2k randomly chosen functions for any k . Also considered are the networks where the round functions are themselves permutations, since these have applications in practice. The constructions are attacked under the assumption that a key-recovery attack on one round function itself requires an exhaustive search over all 2k possible functions.

Attacks are given on all three-, four-, five-, and six-round Feistel constructions and interesting bounds on their security level are obtained. In a chosen text scenario the key recovery attacks on the four-round constructions, the analogue to the super pseudorandom permutations in the Luby and Rackoff model, take roughly only the time of an exhaustive search for the key of one round.

A side result of the presented attacks is that some constructions, which have been proved super pseudorandom in the model of Luby and Rackoff, do not seem to offer more security in our model than constructions which are not super pseudorandom.

Language: English
Publisher: Springer Berlin Heidelberg
Year: 2002
Pages: 207-222
ISSN: 14321378 and 09332790
Types: Journal article
DOI: 10.1007/s00145-002-9839-y
ORCIDs: Knudsen, Lars Ramkilde

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis