Skip to main content
Log in

Generic attacks on the Lai–Massey scheme

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

In this paper we present generic attacks on the Lai–Massey scheme inspired by Patarin’s attacks on the Feistel scheme. For bijective round functions, the attacking results are better than non-bijective round functions for the 3, 4-round Lai–Massey scheme. Our results show that there are some security differences of these two schemes against known attacks. The generic attacks on the 4-round and 5-round Lai–Massey scheme require more complexity than the 4-round and 5-round Feistel scheme respectively. Through the analysis we believe the Lai–Massey scheme has some advantage than the Feistel scheme within 5 rounds.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Bogdanov A., Knudsen L., Leander G., Standaert F., Steinberger J., Tischhauser E.: Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. In: ASIACRYPT 2012. LNCS, vol. 7237, pp. 45–62. Springer, Berlin (2012).

  2. Daemen J., Rijmen V.: The Design of Rijndael: AES—The Advanced Encryption Standard. Springer, Berlin (2002).

  3. Even S., Mansour Y.: A construction of a cipher from a single pseudorandom permutation. J. Cryptol. 10(3), 151–162 (1997).

  4. Feistel H.: Cryptography and computer privacy. Sci. Am. 228(5), 15–23 (1973).

  5. Gilbert H., Minier M.: New results on the pseudorandomness of some blockcipher constructions. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 248–266. Springer, Berlin (2002).

  6. Guo R., Jin C.: Impossible differential cryptanalysis on Lai-Massey scheme. ETRI J. 36(6), 1032–1040 (2014).

  7. Junod P., Vaudenay S.: FOX: a new family of block ciphers. In: Selected Areas in Cryptography—SAC’2004. LNCS, vol. 3357, pp. 114–129. Springer, Berlin (2004).

  8. Knudsen L.R.: DEAL-A 128-bit block cipher. Technical Report 151. Department of Informatics, University of Bergen (1998).

  9. Lai X., Massey J.L.: A proposal for a new block encryption standard. In: Ivan D. (ed.) Advances in Cryptology—EUROCRYPT’90 (Aarhus, Denmark). LNCS, vol. 473, pp. 389–404. Springer, Berlin (1990).

  10. Lai X., Massey J.L.: Markov ciphers and differential cryptanalysis. In: Davies D.W. (ed.) Advances in Cryptology—EUROCRYPT’91 (Brighton, UK). LNCS, vol. 547, pp. 17–38. Springer, Berlin (1991).

  11. Lai X., Massey J.L.: Hash functions based on block ciphers. In: Rueppel, R.A. (ed.) Advances in Cryptography—Eurocrypt’92. LNCS, vol. 658, pp. 55–70. Springer, Berlin (1992).

  12. Luby M., Rackoff C.: How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput. 17(2), 373–386 (1988).

  13. Luo Y., Lai X., Gong Z.: Pseudorandomness analysis of the (extended) Lai-Massey scheme. Inf. Process. Lett. 111(2), 90–96 (2010).

  14. Luo Y., Lai X., Hu J.: The pseudorandomness of many-round Lai-Massey scheme. J. Inf. Sci. Eng. 31(1), 1085–1096 (2015).

  15. Maurer U.M.: A simplified and generalized treatment of Luby-Rackoff pseudorandom permutation generators. In: Advances in Cryptology—EUROCRYPT’92. LNCS, vol. 658, pp. 239–255. Springer, Berlin (1992).

  16. Moriai S., Vaudenay S.: On the pseudorandomness of top-level schemes of block ciphers. In: Advances in Cryptology—ASIACRYPT’00. LNCS, vol. 1976, pp. 289–302. Springer, Berlin (2000).

  17. Nachef V., Patarin J., Treger J.: Generic attacks on Misty schemes. In: LATINCRYPT 2010. LNCS, vol. 6212, pp. 222–240. Springer, Berlin (2010).

  18. Naor M., Reingold O.: On the construction of pseudorandom permutations: Luby-Rackoff revisited. J. Cryptol. 12(1), 22–66 (1999).

  19. Patarin J.: Generic attacks on Feistel schemes (Extended Version). http://eprint.iacr.org/2008/036.pdf.

  20. Patarin J.: How to construct pseudorandom and super pseudorandom permutations from one single pseudorandom function. In: Rueppel R.A. (ed.) Advances in Cryptology—EUROCRYPT’92 (Balatonfiired, Hungary). LNCS, vol. 658, pp. 256–266. Springer, Berlin (1993).

  21. Patarin J.: About Feistel schemes with six (or more) rounds. In: Vaudenay S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 103–121. Springer, Berlin (1998).

  22. Patarin J.: Generic attacks on Feistel schemes. In: Boyd C. (ed.) ASIACRYPT 2001. LNCS vol. 2248, pp. 222–238. Springer, Berlin (2001).

  23. Patarin J.: Luby-Rackoff: 7 rounds are enough for \(2^{n(1-\epsilon )}\) security. In: Boneh D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 513–529. Springer, Berlin (2003).

  24. Patarin J.: Security of random Feistel schemes with 5 or more rounds. In: Franklin M.(ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 106–122. Springer, Berlin (2006).

  25. Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with contracting functions. In: ASIACRYPT 2006. LNCS, vol. 4284, pp. 396–411. Springer, Berlin (2006).

  26. Patarin J., Nachef V., Berbain C.: Generic attacks on unbalanced Feistel schemes with expanding functions. In: ASIACRYPT 2007. LNCS, vol. 4833, pp. 325–341. Springer, Berlin (2007).

  27. Sadeghiyan B., Pieprzyk J.: On necessary and sufficient conditions for the construction of super pseudorandom permutations. In: Abstracts of ASIACRYPT’91. LNCS, vol. 739, pp. 194–209. Springer, Berlin (1991).

  28. Treger J., Patarin J.: Generic attacks on Feistel networks with internal permutations. In: AFRICACRYPT 2009. LNCS, vol. 5580, pp. 41–59. Springer, Berlin (2009).

  29. Vaudenay S.: Provable security for block ciphers by decorrelation. In: Theoretical Aspects of Computer Science—STACS’98. LNCS, vol. 1373, pp. 249–275. Springer, Berlin (1998).

  30. Vaudenay S.: On the Lai-Massey scheme. In: Advances in Cryptology—ASIACRYPT’99. LNCS, vol. 1716, pp. 8–19. Springer, Berlin (1999).

  31. Yun A., Park J., Lee J.: On Lai-Massey and quasi-Feistel ciphers. Des. Codes Cryptogr. 58, 45–72 (2011).

Download references

Acknowledgments

We thank Valérie Nachef and the anonymous reviewers for their helpful comments and feedback. Yiyuan Luo was supported by NSFC (61402280) and the Key Discipine Funding (Computer Technology) of Shanghai Dian Ji University (13XKJ01). Xuejia Lai was supported by NSFC (U1536101, 61272440, 61472251), and China Postdoctoral Science Foundation (2013M531174, 2014T70417), and Science and Technology on Communication Security Laboratory. Yujie Zhou was supported by Shanghai Science and Technology Innovation Action Plan (No. 15DZ1101002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yiyuan Luo.

Additional information

Communicated by V. Rijmen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Luo, Y., Lai, X. & Zhou, Y. Generic attacks on the Lai–Massey scheme. Des. Codes Cryptogr. 83, 407–423 (2017). https://doi.org/10.1007/s10623-016-0235-2

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-016-0235-2

Keywords

Mathematics Subject Classification

Navigation