Skip to main content

Generic Attacks on Feistel Networks with Internal Permutations

  • Conference paper
Progress in Cryptology – AFRICACRYPT 2009 (AFRICACRYPT 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5580))

Included in the following conference series:

Abstract

In this paper, we describe generic attacks on Feistel networks with internal permutations, instead of Feistel networks with internal functions as designed originally. By generic attacks, we mean that in these attacks the internal permutations are supposed to be random. Despite the fact that some real Feistel ciphers actually use internal permutations like Twofish, Camellia, or DEAL, these ciphers have not been studied much. We will see that they do not always behave like the original Feistel networks with round functions. More precisely, we will see that the attacks (known plaintext attacks or chosen plaintext attacks) are often less efficient, namely on all 3i rounds, i ∈ ℕ*. For a plaintext of size 2n bits, the complexity of the attacks will be strictly less than 22n when the number of rounds is less than or equal to 5. When the number k of rounds is greater, we also describe some attacks enabling to distinguish a k-round Feistel network generator from a random permutation generator.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Aiollo, W., Venkatesan, R.: Foiling Birthday Attacks in Lenght-Doubling Transformations - Benes: A Non-Reversible Alternative to Feistel. In: Maurer, U.M. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 307–320. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  2. Aoki, K., Itchikawa, T., Kanda, M., Matsui, M., Nakajima, J., Moriai, S., Tokita, T.: Camellia: A 128-bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39–56. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Biham, E.: Cryptanalysis of Ladder-DES. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 134–138. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

  4. Jutla, C.S.: Generalised Birthday Attacks on Unbalanced Feistel Networks. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol. 1462, pp. 186–199. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  5. Knudsen, L.R.: DEAL - A 128-bit Block Cipher. Technical report number 151, University of Bergen, Norway (1998), http://www2.mat.dtu.dk/people/Lars.R.Knudsen/newblock.html

  6. Knudsen, L.R.: The Security of Feistel Ciphers with Six Rounds or Less. Journal of Cryptology 15, 207–222 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  7. Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM Journal on Computing 17(2), 373–386 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  8. Nyberg, K.: Linear Approximation of Block Ciphers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 439–444. Springer, Heidelberg (1995)

    Chapter  Google Scholar 

  9. Patarin, J.: Generic Attacks on Feistel Schemes. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 222–238. Springer, Heidelberg (2001); An ePrint version of the extended version of this paper is available at, http://eprint.iacr.org/2008/036

    Chapter  Google Scholar 

  10. Patarin, J., Nachef, V., Berbain, C.: Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. In: Lai, X., Chen, K. (eds.) ASIACRYPT 2006. LNCS, vol. 4284, pp. 396–411. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  11. Patarin, J., Nachef, V., Berbain, C.: Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions, Extended Version. Available from the authors (2006)

    Google Scholar 

  12. Piret, G.: Luby-Rackoff revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. Designs, Codes and Cryptography 39(2), 233–245 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  13. Rijmen, R., Preneel, B., De Win, E.: On Weakness of Non-Surjective Round Functions. Designs, Codes and Criptography 12(3), 253–266 (1997)

    Article  MATH  Google Scholar 

  14. Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121–144. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Treger, J., Patarin, J. (2009). Generic Attacks on Feistel Networks with Internal Permutations. In: Preneel, B. (eds) Progress in Cryptology – AFRICACRYPT 2009. AFRICACRYPT 2009. Lecture Notes in Computer Science, vol 5580. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02384-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-02384-2_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-02383-5

  • Online ISBN: 978-3-642-02384-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics