Skip to main content

New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks

  • Conference paper
  • First Online:
Progress in Cryptology – INDOCRYPT 2022 (INDOCRYPT 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13774))

Included in the following conference series:

  • 494 Accesses

Abstract

The Feistel construction is one of the most studied ways of building block ciphers. Several generalizations were proposed in the literature, leading to the Generalized Feistel Network (GFN) construction, in which the round function operates on each pair of blocks in parallel until all branches are permuted. At FSE’10, Suzaki and Minematsu studied the diffusion of such construction, raising the question of how many rounds are required so that each block of the ciphertext depends on all blocks of the plaintext. Exhausting all possible permutations up to 16 blocks, they observed that there were always optimal permutations mapping even-number input blocks to odd-number output blocks and vice versa. Recently, both Cauchois et al. and Derbez et al. proposed new algorithms to build optimal even-odd permutations for up to 36 blocks. In this paper, we present a new algorithm based on iterative path building to search for optimal Feistel permutation. This algorithm is much faster in exhausting optimal non-even-odd permutations than all the previous approaches. Our first result is a computational proof that no non-even-odd permutation reaches a better diffusion round than optimal even-odd permutations up to 32 blocks. Furthermore, it is well known that permutations with an optimal diffusion round do not always lead to optimal permutations against differential cryptanalysis. We investigate several new criteria to build permutations leading to more secure GFN.

The work presented in this article was funded by the French National Research Agency as part of the DeCrypt project (ANR- 18-CE39-0007).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Banik, S.: WARP : revisiting GFN for lightweight 128-bit block cipher. In: Dunkelman, O., Jacobson, Jr., M.J., O’Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 535–564. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-81652-0_21

    Chapter  Google Scholar 

  2. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers. IACR Cryptology ePrint Archive 2013, 404 (2013). http://eprint.iacr.org/2013/404

  3. Cauchois, V., Gomez, C., Thomas, G.: General diffusion analysis: How to find optimal permutations for generalized type-ii feistel schemes. IACR Trans. Symmetric Cryptol. 2019(1), 264–301 (2019). https://doi.org/10.13154/tosc.v2019.i1.264-301, https://doi.org/10.13154/tosc.v2019.i1.264-301

  4. Derbez, P., Fouque, P.-A.: Automatic search of meet-in-the-middle and impossible differential attacks. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 157–184. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53008-5_6

    Chapter  MATH  Google Scholar 

  5. Derbez, P., Fouque, P., Lambin, B., Mollimard, V.: Efficient search for optimal diffusion layers of generalized feistel networks. IACR Trans. Symmetric Cryptol. 2019(2), 218–240 (2019). https://doi.org/10.13154/tosc.v2019.i2.218-240

    Article  Google Scholar 

  6. DES: Data Encryption Standard. FIPS PUB 46, Federal information processing standards publication 46 (1977)

    Google Scholar 

  7. Nyberg, K.: Generalized feistel networks. In: Kim, K., Matsumoto, T. (eds.) ASIACRYPT 1996. LNCS, vol. 1163, pp. 91–104. Springer, Heidelberg (1996). https://doi.org/10.1007/BFb0034838

    Chapter  Google Scholar 

  8. Shi, D., Sun, S., Derbez, P., Todo, Y., Sun, B., Hu, L.: Programming the demirci-selçuk meet-in-the-middle attack with constraints. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11273, pp. 3–34. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-03329-3_1

    Chapter  Google Scholar 

  9. Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342–357. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_23

    Chapter  Google Scholar 

  10. Suzaki, T., Minematsu, K.: Improving the generalized feistel. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 19–39. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13858-4_2

    Chapter  Google Scholar 

  11. Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: TWINE: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339–354. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-35999-6_22

    Chapter  Google Scholar 

  12. Zheng, Y., Matsumoto, T., Imai, H.: On the construction of block ciphers provably secure and not relying on any unproved hypotheses. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 461–480. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_42

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arthur Gontier .

Editor information

Editors and Affiliations

Appendix a Proofs of Proposition 3 and 4

Appendix a Proofs of Proposition 3 and 4

Proposition 3. Let \(\pi \) be an even-odd permutation \(\pi \), X-\(DR(\pi )\) is the smallest integer R such that: \(\forall c\in {V_{\textsf{o}}}, d\in {V_{\textsf{e}}}\), there are X paths of length \(R-3\) from c to d in \(G_\pi \).

Proof

Let \(b,c\in {V_{\textsf{o}}}\) and \(a,d\in {V_{\textsf{e}}}\) with \((a,c),(d,b)\in E_{\pi }\). We have that \((a+1,a),(b,b-1)\in E_{\epsilon }\) with \(a+1\in {V_{\textsf{o}}}\) and \(b-1\in {V_{\textsf{e}}}\). Furthermore, we have \(g,h\in V\) such that \((b,g),(b-1,h)\in E_{\pi }\) (see the graph below with \(i=a+1\) and \(j=b-1\)).

figure j

1) From Definition 8, we know that there is X d-paths of length R from a to g, thus there is X paths of length \(R-3\) from c to d.

2) Now suppose that there is \(R'<X\)-\(DR(\pi )\) such that \(\forall ~ c\in {V_{\textsf{o}}},~ d\in {V_{\textsf{e}}}\) there is X paths of length \(R'-3\) from c to d. We then have X d-paths of length \(R'\) from i to g, from i to h and from a to h. Since we have these d-paths for all pairs \(a\in {V_{\textsf{e}}}, b\in {V_{\textsf{o}}}\) then we have full diffusion with X-\(DR(\pi )=R'\) and thus the contradiction X-\(DR(\pi )<X\)-\(DR(\pi )\).    \(\square \)

Proposition 4. Let \(\pi \) be an even-odd permutation \(\pi \), X-\(SB(\pi )\) is the smallest integer R such that: \(\forall c\in {V_{\textsf{o}}}, d\in {V_{\textsf{e}}}\), there are X S-Boxes traversed by paths of length \(R-3\) from c to d in \(G_\pi \). A S-Box reached by two paths at the same time will be counted only once.

Proof

Let \(b,c\in {V_{\textsf{o}}}\) and \(a,d\in {V_{\textsf{e}}}\) with \((a,c),(d,b)\in E_{\pi }\). We have that \((a+1,a),(b,b-1)\in E_{\epsilon }\) with \(a+1\in {V_{\textsf{o}}}\) and \(b-1\in {V_{\textsf{e}}}\). Furthermore, we have \(g,h\in V\) such that \((b,g),(b-1,h)\in E_{\pi }\) (see the graph below with \(i=a+1\) and \(j=b-1\)).

figure k

1) From Definition 9, we know that there is X S-Boxes in all the d-paths of length R from a to g, thus there is X S-Boxes in all paths of length \(R-3\) from c to d.

2) Now suppose that there is \(R'<X\)-\(SB(\pi )\) such that \(\forall ~ c\in {V_{\textsf{o}}},~ d\in {V_{\textsf{e}}}\) there is X S-Boxes in all the paths of length \(R'-3\) from c to d. We then have X S-Boxes in all the d-paths of length \(R'\) from i to g, from i to h and from a to h. Since we have these d-paths for all pairs \(a\in {V_{\textsf{e}}}, b\in {V_{\textsf{o}}}\) then we have full diffusion with X-\(SB(\pi )=R'\) and thus the contradiction X-\(SB(\pi )<X\)-\(SB(\pi )\).

   \(\square \)

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Delaune, S., Derbez, P., Gontier, A., Prud’homme, C. (2022). New Algorithm for Exhausting Optimal Permutations for Generalized Feistel Networks. In: Isobe, T., Sarkar, S. (eds) Progress in Cryptology – INDOCRYPT 2022. INDOCRYPT 2022. Lecture Notes in Computer Science, vol 13774. Springer, Cham. https://doi.org/10.1007/978-3-031-22912-1_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-22912-1_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-22911-4

  • Online ISBN: 978-3-031-22912-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics