A Statistical Attack of the FEAL-8 Cryptosystem
This paper presents a chosen plaintext cryptanalysis of the FEAL-8 cryptosystem. The attack requires the ciphertext corresponding to approximately 10000 pairs of 64 bit plaintext blocks. The difference (bitwise xor) between the two blocks of each pair is equal to an appropriately selected constant. We first state that some differential statistics for intermediate values of the data randomizer are non uniform and independent of the encryption key. We then show that these statistics can be used to compute gradually the expanded key of the data randomizer.
KeywordsSample Pair Exhaustive Search Statistical Attack Differential Statistic Attack Method
- A. Shamir Lecture at Secuticom 89.Google Scholar
- Bert Den Boer Cryptanalysis of F.E.A.L., Proceedings of Eurocrypt’ 88, pp 293–299.Google Scholar
- S. Miyaguchi, S. Shiraishi, S. Shimizu Fast Data Encipherment Algorithm PEAL-8 Review of the Electrical Communication Laboratories, Vol. 36, No 4 (1988).Google Scholar