Advances in Cryptology - ASIACRYPT 2013
Volume 8269 of the series Lecture Notes in Computer Science pp 464-485
Generic Key Recovery Attack on Feistel Scheme
- Takanori IsobeAffiliated withSony Corporation
- , Kyoji ShibutaniAffiliated withSony Corporation
Abstract
We propose new generic key recovery attacks on Feistel-type block ciphers. The proposed attack is based on the all subkeys recovery approach presented in SAC 2012, which determines all subkeys instead of the master key. This enables us to construct a key recovery attack without taking into account a key scheduling function. With our advanced techniques, we apply several key recovery attacks to Feistel-type block ciphers. For instance, we show 8-, 9- and 11-round key recovery attacks on n-bit Feistel ciphers with 2n-bit key employing random keyed F-functions, random F-functions, and SP-type F-functions, respectively. Moreover, thanks to the meet-in-the-middle approach, our attack leads to low-data complexity. To demonstrate the usefulness of our approach, we show a key recovery attack on the 8-round reduced CAST-128, which is the best attack with respect to the number of attacked rounds. Since our approach derives the lower bounds on the numbers of rounds to be secure under the single secret key setting, it can be considered that we unveil the limitation of designing an efficient block cipher by a Feistel scheme such as a low-latency cipher.
Keywords
block cipher key scheduling function all-subkeys-recovery attack meet-in-the-middle attack key recovery attack low-data complexity attack- Title
- Generic Key Recovery Attack on Feistel Scheme
- Book Title
- Advances in Cryptology - ASIACRYPT 2013
- Book Subtitle
- 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I
- Pages
- pp 464-485
- Copyright
- 2013
- DOI
- 10.1007/978-3-642-42033-7_24
- Print ISBN
- 978-3-642-42032-0
- Online ISBN
- 978-3-642-42033-7
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- 8269
- Series ISSN
- 0302-9743
- Publisher
- Springer Berlin Heidelberg
- Copyright Holder
- Springer-Verlag Berlin Heidelberg
- Additional Links
- Topics
- Keywords
-
- block cipher
- key scheduling function
- all-subkeys-recovery attack
- meet-in-the-middle attack
- key recovery attack
- low-data complexity attack
- Industry Sectors
- eBook Packages
- Editors
-
-
Kazue Sako
(16)
-
Palash Sarkar
(17)
-
Kazue Sako
- Editor Affiliations
-
- 16. NEC Corporation
- 17. Indian Statistical Institute
- Authors
-
-
Takanori Isobe
(18)
-
Kyoji Shibutani
(18)
-
Takanori Isobe
- Author Affiliations
-
- 18. Sony Corporation, 1-7-1 Konan, Minato-ku, Tokyo, 108-0075, Japan
Continue reading...
To view the rest of this content please follow the download PDF link above.