Understanding the Related-Key Security of Feistel Ciphers from a Provable Perspective

10/17/2018
by   Chun Guo, et al.
0

We initiate the provable related-key security treatment for models of practical Feistel ciphers. In detail, we consider Feistel networks with four whitening keys _i(k) (i=0,1,2,3) and round-functions of the form f(_i(k)⊕ X), where k is the main-key, _i and _i are efficient transformations, and f is a public ideal function or permutation that the adversary is allowed to query. We investigate conditions on the key-schedules that are sufficient for security against XOR-induced related-key attacks up to 2^n/2 adversarial queries. When the key-schedules are non-linear, we prove security for 4 rounds. When only affine key-schedules are used, we prove security for 6 rounds. These also imply secure tweakable Feistel ciphers in the Random Oracle model. By shuffling the key-schedules, our model unifies both the DES-like structure (known as Feistel-2 scheme in the cryptanalytic community, a.k.a. key-alternating Feistel due to Lampe and Seurin, FSE 2014) and the Lucifer-like model (previously analyzed by Guo and Lin, TCC 2015). This allows us to derive concrete implications on these two (more common) models, and helps understanding their differences---and further understanding the related-key security of Feistel ciphers.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/21/2023

Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher

The Even-Mansour (EM) cipher is one of the famous constructions for a bl...
research
05/04/2021

Quantum Key-length Extension

Should quantum computers become available, they will reduce the effectiv...
research
08/05/2023

Understanding the RSA algorithm

With the emerging importance of cybersecurity, it will be beneficial for...
research
09/20/2018

Towards practical key exchange from ordinary isogeny graphs

We revisit the ordinary isogeny-graph based cryptosystems of Couveignes ...
research
12/11/2022

Cryptanalysis and designing chaos-based irreversible and parallel key expansion module over Galois field

From the security criteria of irreversibility, parallelizability and ind...
research
02/09/2018

Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks

This paper introduces Freestyle, a randomized and variable round version...
research
02/21/2022

Single-Query Verifiable Proof-of-Sequential-Work

We propose a proof-of-sequential-work (PoSW) that can be verified with o...

Please sign up or login with your details

Forgot password? Click here to reset