Generic Key Recovery Attacks on the Variants of the Feistel-2 Ciphers

来源 :中国密码学会2016年密码算法会议 | 被引量 : 0次 | 上传用户:booksky
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
  Feistel-2 is a Feistel scheme proposed by Isobe and Shibutani in Asiacrypt 2013, in which the round functions are composed of an XOR of a subkey followed by an application of a public function or permutation.Recently, a variation of the Feistel-2 scheme, in which the subkeys XORed after the round functions, has been widely used in proposals, like SIMON and Simeck.We denote this type Feistel scheme as Feistel-2*.In this paper, we study the security of the Feistel-2* ciphers and propose meet-in-the-middle attacks on Feistel-2* ciphers.Assuming that the block size is n, our attacks can further break up 8, 10, 12 rounds for n-, 3n/2-, 2n-bit key size, respectively.In particular, if the round functions of Feistel-2* follows by the SPN structure (this cipher is denoted as Feistel-3* here), our attacks can break up 12, 14 and 16 rounds for n-, 3n/2-, 2n-bit key size, respectively.Based on these results, lower bounds on the number of rounds that the secure Feistel-2* and Feistel-3* ciphers should have have been given.These results imply that the location of the subkey has an effect on the security of the Feistel cipher.
其他文献
涂料生产采用HYM-21与化学乳液共聚技术,可以增加涂膜的结构强度、附着力、遮盖率、保色性和提高装饰效果、节省原材料及施工工料成本、降低涂料中有害物含量等.
将γ-辐射增黏和超临界CO2发泡技术相结合,进行了聚L-乳酸(PLLA)发泡材料的研究,考察了γ-辐射吸收剂量和超临界CO2工艺条件对PLLA发泡材料结构和性能的影响.结果表明,加入多
文章阐述了无机玻化微珠的优点,无机玻化微珠轻质砂浆参考配方,SP胶粉添加剂和国内外几种乳胶粉性能的比较。
文章阐述了真金板保温系统、EPS板外墙保温系统、XPS板保温系统、无机发泡水泥板外墙保温系统等的优缺点,无机防火轻集料膨胀珍珠岩保温板外墙外保温系统安全性可靠,B1, B2级有
文章就内外墙腻子粉裂缝产生的原因与防治做一个全面的论述,阐述了通常所见的墙面裂缝,谈腻子层龟裂的几个问题。
中国是世界上经济发展最快的国家,也是能源需求与消费量最大的国家,资源能源和环境保护问题较突出,根据中国国情,开展节能降耗工作,十分重要.
保留格式加密(FPE)是分组密码算法的一种工作模式,利用此方式加密得到的密文与原始明文具有相同的格式和长度.比如,身份证号采用保留格式加密后得到的密文依然是由18位数字组
  To tackle with physical attacks to real world cryptosystems,leakage resilient cryptography was developed.In this setting, the adversary is allowed to have a
会议
  In the information era, more and more data are produced, which imposes a heavy burden on local storage.Fortunately, the cloud computing paradigm provides us
  Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks.At ASIACRYPT 2011, Dunkelman et al.p