Abstract
This paper presents a chosen plaintext cryptanalysis of the FEAL-8 cryptosystem. The attack requires the ciphertext corresponding to approximately 10000 pairs of 64 bit plaintext blocks. The difference (bitwise xor) between the two blocks of each pair is equal to an appropriately selected constant. We first state that some differential statistics for intermediate values of the data randomizer are non uniform and independent of the encryption key. We then show that these statistics can be used to compute gradually the expanded key of the data randomizer.
Chapter PDF
References
A. Shamir Lecture at Secuticom 89.
Bert Den Boer Cryptanalysis of F.E.A.L., Proceedings of Eurocrypt’ 88, pp 293–299.
S. Miyaguchi, S. Shiraishi, S. Shimizu Fast Data Encipherment Algorithm PEAL-8 Review of the Electrical Communication Laboratories, Vol. 36, No 4 (1988).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gilbert, H., Chassé, G. (1991). A Statistical Attack of the FEAL-8 Cryptosystem. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_2
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive