Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions

  • Emmanuel Volte
  • Valérie Nachef
  • Jacques Patarin
Conference paper

DOI: 10.1007/978-3-642-17373-8_6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6477)
Cite this paper as:
Volte E., Nachef V., Patarin J. (2010) Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. In: Abe M. (eds) Advances in Cryptology - ASIACRYPT 2010. ASIACRYPT 2010. Lecture Notes in Computer Science, vol 6477. Springer, Berlin, Heidelberg

Abstract

“Generic” Unbalanced Feistel Schemes with Expanding Functions are Unbalanced Feistel Schemes with truly random internal round functions from n bits to (k − 1)n bits with k ≥ 3. From a practical point of view, an interesting property of these schemes is that since n < (k − 1)n and n can be small (8 bits for example), it is often possible to store these truly random functions in order to design efficient schemes (example: CRUNCH cf [6]). Attacks on these generic schemes were studied in [7] and [18]. As pointed in [7] and [18], there are surprisingly much more possibilities for these attacks than for generic balanced Feistel schemes or generic unbalanced Feistel schemes with contracting functions. In fact, this large number of attack possibilities makes the analysis difficult. In this paper, we shall methodically analyze again these attacks. We have created a computer program that systematically analyze all the possible attacks and detect the most efficient ones. We have detected a condition on the internal variables that was not clearly analyzed in [18], and we have found many new improved attacks by a systematic study of all the “rectangle attacks” when k ≤ 7, and then we have generalized these improved attacks for all k. Many simulations on our improved attacks have also been done and they confirm our theoretical analysis.

Keywords

Unbalanced Feistel permutations pseudo-random permutations generic attacks on encryption schemes Block ciphers 
Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2010

Authors and Affiliations

  • Emmanuel Volte
    • 1
  • Valérie Nachef
    • 1
  • Jacques Patarin
    • 2
  1. 1.Department of MathematicsUniversity of Cergy-Pontoise, CNRS UMR 8088Cergy-Pontoise CedexFrance
  2. 2.PRISM, University of VersaillesVersailles CedexFrance

Personalised recommendations