Analysis of 3-line generalized Feistel networks with double SD-functions

https://doi.org/10.1016/j.ipl.2011.04.002Get rights and content

Abstract

Generalized Feistel networks (GFN) are broadly employed in the design of primitives for block ciphers, stream ciphers, and hash functions. Lately, endowing the functions of GFNs with the structure of nonlinear substitution followed by linear diffusion (substitution–diffusion, SD) has received a great deal of attention. In this contribution, we prove tight lower bounds on the number of differentially and linearly active S-boxes for 3-line GFNs with double SD-functions where two SD-structures are applied one after another. We also show 8-round impossible differentials for 3-line GFNs with bijective functions. Moreover, we demonstrate that the proportion of active S-boxes in all S-boxes for such GFNs is by up to 14% higher than that for 4-line GFNs with double SD-functions, when instantiated with MDS matrices. This indicates that, rather surprisingly, the 3-line GFNs can be more efficient in practice than those with 4 lines.

Highlights

► Double SD-structures as F-functions for 3-line GFNs. ► Lower bounds on the number of active S-boxes in such 3-line GFNs. ► Tightness of these bounds for MDS matrices. ► 8-round impossible differentials for 3-line GFNs. ► 3-line GFNs are up to 14% more efficient than 4-line GFNs for double SD.

References (20)

  • E. Biham et al.

    Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials

  • J. Borst et al.

    Two attacks on reduced IDEA

  • E. Biham et al.

    Differential cryptanalysis of DES-like cryptosystems

    J. Cryptology

    (1991)
  • C. Bouillaguet et al.

    Attacks on hash functions based on generalized Feistel application to reduced-round Lesamnta and SHAvite-3512

  • J. Choy et al.

    Impossible boomerang attack for block cipher structures

  • S. Hirose, H. Kuwakado, SHA-3 Proposal: Lesamnta, submission to NIST,...
  • M. Matsui

    Linear cryptanalysis of the data encryption standard

  • Y. Zheng et al.

    On the construction of block ciphers provably secure and not relying on any unproved hypotheses

  • J. Daemen et al.

    The Design of Rijndael: AES—The Advanced Encryption Standard

    (2002)
  • W. Wu et al.

    Security on generalized Feistel scheme with SP round function

    Int. J. Netw. Secur.

    (2006)
There are more references available in the full text version of this article.

Cited by (0)

1

Both authors made equal contributions to this work.

View full text