Skip to main content

Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis

  • Conference paper
Advances in Security Technology (SecTech 2008)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 29))

Included in the following conference series:

Abstract

The design of block ciphers with provable security against differential and linear cryptanalysis has always been an important consideration. However, it is also vital to evaluate the security of block ciphers against other forms of cryptanalysis, for example, impossible differential cryptanalysis, a variant of differential cryptanalysis (DC). In impossible differential cryptanalysis, impossible differential characteristics are used to retrive a subkey material for the first or the last several rounds of block ciphers. Thus the security of a block cipher against impossible differential cryptanalysis can be evaluated by impossible differential characteristics [1]. In this paper, we will first examine the security of Extended Feistel Networks (EFN) against DC and then use the U-method introduced in [1] to find impossible differential characteristics of EFN.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., Sung, S.: Impossible Differential Cryptanalysis fir Block Cipher Structures. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 82–96. Springer, Heidelberg (2003)

    Google Scholar 

  2. Ibrahim, S., Maarof, M.A., Ngadiman, M.S.: Practical Security against Differential Cryptanalysis for Extended Feistel Network. Universiti Teknologi Malaysia

    Google Scholar 

  3. Sung, J., Lee, A., Lim, J., Hong, S., Park, S.: Provable Security for the Skipjack-like Structure against Differential Cryptanalyis and Linear Cryptanalysis. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 274–288. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  4. Schneier, B., Kelsey, J.: Unbalanced Feistel Networks and Block-Cipher Design. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 121–144. Springer, Heidelberg (1996)

    Google Scholar 

  5. Aoki, K., Ohta, K.: Strict evaluation of the maximum average of differential probability and the maximum average of linear probability. IEICE Transactions fundamentals of Electronics, Communications and Computer Sciences 1, 2–8 (1997)

    Google Scholar 

  6. Kim, J., Lee, C., Sung, J., Hong, S., Lee, S., Lim, J.: Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis. IEICE Transactions fundamentals of Electronics, Communications and Computer Sciences 10, 3047–3058 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yap, H. (2009). Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis. In: Kim, Hk., Kim, Th., Kiumi, A. (eds) Advances in Security Technology. SecTech 2008. Communications in Computer and Information Science, vol 29. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-10240-0_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-10240-0_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-10239-4

  • Online ISBN: 978-3-642-10240-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics