Abstract
We explore the optimality of balanced Feistel ciphers with SP-type F-functions with respect to their resistance against differential and linear cryptanalysis. Instantiations of Feistel ciphers with the wide class of (SP)\(^u\) and (SP)\(^u\)S F-functions are considered: one F-function can contain an arbitrary number of S-box layers interleaved with linear diffusion. For the matrices with maximum diffusion, it is proven that SPS and SPSP F-functions are optimal in terms of the proportion of active S-boxes in all S-boxes—a common efficiency metric for substitution-permutation ciphers. Interestingly, one SP-layer in the F-function is not enough to attain optimality whereas taking more than two S-box layers does not increase the efficiency either.







Similar content being viewed by others
References
Aoki K., Ohta K.: Strict evaluation of the maximum average of differential probability and the maximum average of linear probability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80–A(1), 2–8 (1997).
Aoki K., Ichikawa T., Kanda M., Matsui M., Moriai S., Nakajima J., Tokita T.: Camellia: a 128-bit block cipher suitable for multiple platforms: design and analysis. In: Stinson D.R., Tavares S. (eds.) Proceedings of Selected Areas in Cryptography: SAC 2000. Lecture Notes in Computer Science, vol. 2012, pp. 39–56. Springer, Berlin (2001).
Biham E.: On Matsui’s linear cryptanalysis. In: Santis A.D. (ed.) Advances in Cryptology: EUROCRYPT ’94. Lecture Notes in Computer Science, vol. 950. Springer, Berlin (1994).
Biham E., Dunkelman O.: The SHAvite-3 hash function. Tweaked version (2009).
Biham E., Shamir A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4, 3–72 (1991).
Bogdanov A.: On the differential and linear efficiency of balanced Feistel networks. Inf. Process. Lett. 110(20), 861–866 (2010).
Bogdanov A.: On unbalanced Feistel networks with contracting MDS diffusion. Des. Codes Cryptogr. 59(1—-3), 35–58 (2011).
Bogdanov A., Shibutani K.: Analysis of 3-line generalized Feistel networks with double SD-functions. Inf. Process. Lett. 111(13), 656–660 (2011).
Bogdanov A., Shibutani K.: Double SP-functions: enhanced generalized Feistel networks. In: Parampalli U., Hawkes P. (eds.) ACISP’11. Lecture Notes in Computer Science, vol. 6812, pp. 106–119. Springer, Berlin (2011).
Bogdanov A., Shibutani K.: Generalized Feistel networks revisited. In: Canteaut A., Augot D. (eds.) Proceedings of International Workshop on Coding and Cryptography (WCC’11). Bergen, Norway (2011).
Coppersmith D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994).
Daemen J., Rijmen V.: The Design of Rijndael. The Advanced Encryption Standard (AES, Information Security and Cryptography). Springer, Berlin (2002).
FIPS: Data Encryption Standard. National Bureau of Standards. US Department of Commerce, Washington (1997).
Feistel H.: Cryptography and computer privacy. Sci. Am. 228, 1523 (1973).
Kanda M.: Practical security evaluation against differential and linear cryptanalyses for Feistel ciphers with SPN round function. In: Stinson D.R., Tavares S. (eds.) SAC 2000. Lecture Notes in Computer Science, vol. 2012. Springer, Berlin (2001).
Kanda M., Moriai S., Aoki K., Ueda H., Takashima Y., Ohta K., Matsumoto T.: E2: a new 128-bit block cipher. IEICE Trans. Fundam. E83–A(1), 48–59 (2000).
Kang J.S., Hong S., Lee S., Yi O., Park C., Lim J.: Practical and provable security against differential and linear cryptanalysis for substitution-permutation networks. ETRI J. 23(4), 158–167 (2001).
Matsui M.: Linear cryptanalysis of the Data Encryption Standard. In: Helleseth T. (ed.) Advances in Cryptology EUROCRYPT’93. Lecture Notes in Computer Science, pp. 386–397. Springer, Berlin (1994).
Matsui M.: On correlation between the order of s-boxes and the strength of DES. In: Santis A.D. (ed.) Advances in Cryptology EUROCRYPT’94. Lecture Notes in Computer Science, vol. 950, pp. 366–375. Springer, Berlin (1994).
National Soviet Bureau of Standards, Information Processing System: Cryptographic Protection—Cryptographic Algorithm GOST 28147–89 (1989).
Shamir A.: On the Security of DES. CRYPTO’85. Lecture Notes in Computer Science. Springer, Berlin (1985).
Schneier B., Kelsey J., Whiting D., Wagner D., Hall C., Ferguson N.: The Twofish Encryption Algorithm: A 128-Bit Block Cipher. Wiley, New York (1999).
Shibutani K., Isobe T., Hiwatari H., Mitsuda A., Akishita T., Shirai T.: Piccolo: an ultra-lightweight blockcipher. In: Preneel B., Takagi T. (eds.) CHES’11. Lecture Notes in Computer Science, vol. 6917, pp. 342–357. Springer, Berlin (2011).
Shimizu H.: On the security of Feistel cipher with SP-type F function. In Proceedings of SCIS (in Japanese) (2001).
Shirai T., Preneel B.: On Feistel ciphers using optimal diffusion mappings across multiple rounds. In: Lee P.J. (ed.) ASIACRYPT’04. Lecture Notes in Computer Science, vol. 3329, pp. 1–15. Springer, Berlin (2004).
Shirai T., Shibutani K.: Improving immunity of Feistel ciphers against differential cryptanalysis by using multiple MDS matrices. In: Roy B.K., Meier W. (eds.) FSE’04. Lecture Notes in Computer Science, vol. 3017, pp. 260–278. Springer, Berlin (2004).
Shirai T., Shibutani K.: On Feistel structures using a diffusion switching mechanism. In: Robshaw M.J.B. (ed.) FSE’06. Lecture Notes in Computer Science, vol. 4047, pp. 41–56. Springer, Berlin (2006).
Shirai T., Shibutani K., Akishita T., Moriai S., Iwata T.: The 128-bit blockcipher CLEFIA. In: Biryukov A. (ed.) FSE’07. Lecture Notes in Computer Science, vol. 4953, pp. 181–195. Springer, Berlin (2007).
Tardy-Corfdir A., Gilbert H.: A known plaintext attack of FEAL-4 and FEAL-6. In: Feigenbaum J. (ed.) CRYPTO’91. Lecture Notes in Computer Science, vol. 576, pp. 172–181. Springer, Berlin (1991).
Third Generation Partnership Project, Technical Specification Group Services and System Aspects, 3G Security, Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI Specification, V3.1.1 (2001).
Author information
Authors and Affiliations
Corresponding author
Additional information
This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue on Coding and Cryptography”.
Rights and permissions
About this article
Cite this article
Shibutani, K., Bogdanov, A. Towards the optimality of Feistel ciphers with substitution-permutation functions. Des. Codes Cryptogr. 73, 667–682 (2014). https://doi.org/10.1007/s10623-014-9970-4
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-014-9970-4
Keywords
- Block cipher
- Balanced Feistel networks
- Differential cryptanalysis
- Linear cryptanalysis
- Active S-boxes
- MDS codes