Abstract
In this paper we present generic attacks on the Lai–Massey scheme inspired by Patarin’s attacks on the Feistel scheme. For bijective round functions, the attacking results are better than non-bijective round functions for the 3, 4-round Lai–Massey scheme. Our results show that there are some security differences of these two schemes against known attacks. The generic attacks on the 4-round and 5-round Lai–Massey scheme require more complexity than the 4-round and 5-round Feistel scheme respectively. Through the analysis we believe the Lai–Massey scheme has some advantage than the Feistel scheme within 5 rounds.
Similar content being viewed by others
References
Bogdanov A., Knudsen L., Leander G., Standaert F., Steinberger J., Tischhauser E.: Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. In: ASIACRYPT 2012. LNCS, vol. 7237, pp. 45–62. Springer, Berlin (2012).
Daemen J., Rijmen V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002).
Even S., Mansour Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151–162 (1997).
Feistel H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973).
Gilbert H., Minier M.: New results on the pseudorandomness of some blockcipher constructions. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 248–266. Springer, Berlin (2002).
Guo R., Jin C.: Impossible differential cryptanalysis on Lai-Massey scheme. ETRI J. 36(6), 1032–1040 (2014).
Junod P., Vaudenay S.: FOX: a new family of block ciphers. In: Selected Areas in Cryptography—SAC’2004. LNCS, vol. 3357, pp. 114–129. Springer, Berlin (2004).
Knudsen L.R.: DEAL-A 128-bit block cipher. Technical Report 151. Department of Informatics, University of Bergen (1998).
Lai X., Massey J.L.: A proposal for a new block encryption standard. In: Ivan D. (ed.) Advances in Cryptology—EUROCRYPT’90 (Aarhus, Denmark). LNCS, vol. 473, pp. 389–404. Springer, Berlin (1990).
Lai X., Massey J.L.: Markov ciphers and differential cryptanalysis. In: Davies D.W. (ed.) Advances in Cryptology—EUROCRYPT’91 (Brighton, UK). LNCS, vol. 547, pp. 17–38. Springer, Berlin (1991).
Lai X., Massey J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) Advances in Cryptography—Eurocrypt’92. LNCS, vol. 658, pp. 55–70. Springer, Berlin (1992).
Luby M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988).
Luo Y., Lai X., Gong Z.: Pseudorandomness analysis of the (extended) Lai-Massey scheme. Inf. Process. Lett. 111(2), 90–96 (2010).
Luo Y., Lai X., Hu J.: The pseudorandomness of many-round Lai-Massey scheme. J. Inf. Sci. Eng. 31(1), 1085–1096 (2015).
Maurer U.M.: A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators. In: Advances in Cryptology—EUROCRYPT’92. LNCS, vol. 658, pp. 239–255. Springer, Berlin (1992).
Moriai S., Vaudenay S.: On the pseudorandomness of top-level schemes of block ciphers. In: Advances in Cryptology—ASIACRYPT’00. LNCS, vol. 1976, pp. 289–302. Springer, Berlin (2000).
Nachef V., Patarin J., Treger J.: Generic attacks on Misty schemes. In: LATINCRYPT 2010. LNCS, vol. 6212, pp. 222–240. Springer, Berlin (2010).
Naor M., Reingold O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. J. Cryptol. 12(1), 22–66 (1999).
Patarin J.: Generic attacks on Feistel schemes (Extended Version). http://eprint.iacr.org/2008/036.pdf.
Patarin J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel R.A. (ed.) Advances in Cryptology—EUROCRYPT’92 (Balatonfiired, Hungary). LNCS, vol. 658, pp. 256–266. Springer, Berlin (1993).
Patarin J.: About Feistel schemes with six (or more) rounds. In: Vaudenay S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 103–121. Springer, Berlin (1998).
Patarin J.: Generic attacks on Feistel schemes. In: Boyd C. (ed.) ASIACRYPT 2001. LNCS vol. 2248, pp. 222–238. Springer, Berlin (2001).
Patarin J.: Luby-Rackoff: 7 rounds are enough for \(2^{n(1-\epsilon )}\) security. In: Boneh D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 513–529. Springer, Berlin (2003).
Patarin J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin M.(ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 106–122. Springer, Berlin (2006).
Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with contracting functions. In: ASIACRYPT 2006. LNCS, vol. 4284, pp. 396–411. Springer, Berlin (2006).
Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with expanding functions. In: ASIACRYPT 2007. LNCS, vol. 4833, pp. 325–341. Springer, Berlin (2007).
Sadeghiyan B., Pieprzyk J.: On necessary and sufficient conditions for the construction of super pseudorandom permutations. In: Abstracts of ASIACRYPT’91. LNCS, vol. 739, pp. 194–209. Springer, Berlin (1991).
Treger J., Patarin J.: Generic attacks on Feistel networks with internal permutations. In: AFRICACRYPT 2009. LNCS, vol. 5580, pp. 41–59. Springer, Berlin (2009).
Vaudenay S.: Provable security for block ciphers by decorrelation. In: Theoretical Aspects of Computer Science—STACS’98. LNCS, vol. 1373, pp. 249–275. Springer, Berlin (1998).
Vaudenay S.: On the Lai-Massey scheme. In: Advances in Cryptology—ASIACRYPT’99. LNCS, vol. 1716, pp. 8–19. Springer, Berlin (1999).
Yun A., Park J., Lee J.: On Lai-Massey and quasi-Feistel ciphers. Des. Codes Cryptogr. 58, 45–72 (2011).
Acknowledgments
We thank Valérie Nachef and the anonymous reviewers for their helpful comments and feedback. Yiyuan Luo was supported by NSFC (61402280) and the Key Discipine Funding (Computer Technology) of Shanghai Dian Ji University (13XKJ01). Xuejia Lai was supported by NSFC (U1536101, 61272440, 61472251), and China Postdoctoral Science Foundation (2013M531174, 2014T70417), and Science and Technology on Communication Security Laboratory. Yujie Zhou was supported by Shanghai Science and Technology Innovation Action Plan (No. 15DZ1101002).
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by V. Rijmen.
Rights and permissions
About this article
Cite this article
Luo, Y., Lai, X. & Zhou, Y. Generic attacks on the Lai–Massey scheme. Des. Codes Cryptogr. 83, 407–423 (2017). https://doi.org/10.1007/s10623-016-0235-2
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-016-0235-2