Abstract
A usual way to construct block ciphers is to apply several rounds of a given structure. Many kinds of attacks are mounted against block ciphers. Among them, differential and linear attacks are widely used. Vaudenay showed that ciphers achieving perfect pairwise decorrelation are secure against linear and differential attacks. It is possible to obtain such schemes by introducing at least one random affine permutation as a round function in the design of the scheme. In this paper, we study attacks on schemes based on classical Feistel schemes where we introduce one or two affine permutations. Since these schemes resist against linear and differential attacks, we will study attacks based on specific equations on 4-tuples of plaintext/ciphertext messages. We show that these schemes are stronger than classical Feistel schemes.

Similar content being viewed by others
References
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A. , Vanstone, P.S.A. (eds.) Advances in Cryptology – CRYPTO 1990, vol. 537 of Lecture Notes in Computer Science, pp 2–21. Springer (1991)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Gilbert, H., Minier, M.: New results on the pseudorandomness of some blockcipher constructions. In: Matsui, M. (ed.) Fast Software Encrytion – FSE ’01, vol. 2355 of Lecture Notes in Computer Science, pp 248–266. Springer (2001)
Hoel, P.G., Port, S.C., Stone, C.J.: Introduction to Probability Theory. Houghton Mifflin Company (1971)
Jutla, C.S.: Generalized birthday attacks on unbalanced feistel networks. In: Krawczyk, H. (ed.) Advances in Cryptology – CRYPTO ’98, vol. 1462 of Lecture Notes in Computer Science, pp 186–199. Springer (1998)
Knudsen, L.R.: DEAL - A 128-Bit Block Cipher. Technical Report 151, University of Bergen, Department of Informatics, Norway (1998)
Luby, M., Rackoff, C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988)
Lucks, S.: Faster luby-rackoff ciphers. In: Gollman, D. (ed.) Fast Software Encryption – FSE ’96, vol. 1039 of Lecture Notes in Computer Science, pp 189–203. Springer (1996)
Matsui, M.: Linear cryptanalysis methods for DES cipher. In: Goos, G., Hartmanis, J. (eds.) Advances in Cryptology – EUROCRYPT 1993, vol. 765 of Lecture Notes in Computer Science, pp 386–397. Springer (1994)
Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Goos, G., Hartmanis, J. (eds.) Advances in Cryptology – CRYPTO 1994, vol. 869 of Lecture Notes in Computer Science, pp 1–11. Springer (1994)
Nachef, V., Patarin, J., Treger, J.: Generic attacks on misty schemes. In: Abdalla, M., Barretol, P.S.L.M. (eds.) Progress in Cryptology – LATINCRYPT 2010, vol. 6212 of Lecture Notes in Computer Science, pp 222–240. Springer (2010)
Nachef, V., Volte, E., Patarin, J.: Differential attacks on generalized feistel schemes. In: Abdalla, M., Nita-Rotaru, C. , Dahab, R. (eds.) CANS 2013, vol. 8257 of Lecture Notes in Computer Science, pp 1–19. Springer (2013)
Naor, M., Reingold, O.: On the construction of pseudorandom permutations: Luby-rackoff revisited. J. Cryptol. 12(1), 29–66 (1999)
Patarin, J.: Generic attacks on feistel schemes. In: Boyd, C. (ed.) Advances in Cryptology – ASIACRYPT 2001, vol. 2248 of Lecture Notes in Computer Science, pp 222–238. Springer (2001)
Patarin, J., Nachef, V., Berbain, C.: Generic attacks on unbalanced feistel schemes with contracting functions. In: Lai, X., Chen, K. (eds.) Advances in Cryptology – ASIACRYPT 2006, vol. 4284 of Lecture Notes in Computer Science, pp 396–411. Springer (2006)
Schneier, B., Kelsey, J.: Unbalanced feistel networks and block cipher design. In: Gollmann, D. (ed.) Fast Software Encrytion – FSE ’96, vol. 1039 of Lecture Notes in Computer Science, pp 121–144. Springer (1996)
Treger, J., Patarin, J.: Generic attacks on feistel networks with internal permutations. In: Preneel, B. (ed.) Progresses in Cryptology – AFRICACRYPT ’09, Lecture Notes in Computer Science. Springer (2009)
Vaudenay, S.: Provable security for block ciphers by decorralation. In: Movan, M., Meinel, C., Krob, D. (eds.) STACS 1998, vol. 1373 of Lecture Notes in Computer Science, pp 249–265. Springer (1998)
Vaudenay, S.: Decorrelation: A theory for block cipher security. J. Cryptol. 16 (4), 249–286 (2003)
Volte, E., Nachef, V., Marrière, N.: Improvements of attacks on various feistel schemes. In: MYCRYPT 2016, Lecture Notes in Computer Science. Springer (2016)
Volte, E., Nachef, V., Patarin, J.: Improved generic attacks on unbalanced feistel schemes with expanding functions. In: Abe, M. (ed.) Advances in Cryptology – ASIACRYPT 2010, vol. 6477 of Lecture Notes in Computer Science, pp 94–111. Springer (2010)
Acknowledgements
The authors want to thank the anonymous referee for the KPA on φ ∘ Ψ(f 1) with \((n+1)2^{\frac {n}{2}}\) messages.
Author information
Authors and Affiliations
Corresponding author
Additional information
This article is part of the Topical Collection on Recent Trends in Cryptography
Rights and permissions
About this article
Cite this article
Nachef, V., Patarin, J. & Volte, E. Generic attacks with standard deviation analysis on a-feistel schemes. Cryptogr. Commun. 10, 59–77 (2018). https://doi.org/10.1007/s12095-017-0244-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-017-0244-7
Keywords
- Affine permutations
- Classical Feistel permutations
- Pseudo-random permutations
- Generic attacks
- Luby-Rackoff theory
- Block ciphers