Abstract
In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers. We introduce a new concept, practical security against linear and differential attacks on Feistel ciphers. We give examples of such Feistel ciphers (practically) resistant to differential attacks, linear attacks and other attacks.
This paper was written while the author was visiting the ETH, Zürich, Switzerland
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham, A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag, New York, 1993.
E. Biham. New Types of Cryptanalytic Attacks Using Related Keys. Proceedings of EuroCrypt'93, Springer Verlag, LNCS 765, 1994.
E. Biham. Private Communication.
L. Brown, J. Pieprzyk, J. Seberry. LOKI — A Cryptographic Primitive for Authentication and Secrecy Applications. Proceedings of AusCrypt '90. Springer Verlag, LNCS 453, 1990.
L. Brown, M. Kwan, J. Pieprzyk, J. Seberry. Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Proceedings of AsiaCrypt'91, Springer Verlag, LNCS 739, 1993.
Data Encryption Standard, Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977.
J.H. Evertse. Linear Structures in Blockciphers. Proceedings of EuroCrypt'87, Springer Verlag, LNCS 304, 1988.
H.M. Heys, S. E. Tavares. The Design of Product Ciphers Resistant to Differential and Linear Cryptanalysis. Technical Report, Aug. 19, 1993, Queen's University at Kingston, Ontario, Canada.
L.R. Knudsen. Cryptanalysis of LOKI. Proceedings of AsiaCrypt'91, Springer Verlag, LNCS 739, 1993.
L.R. Knudsen. Iterative Characteristics of DES and s 2-DES. Proceedings of Crypto'92, Springer Verlag, LNCS 740, 1993.
L.R. Knudsen. Cryptanalysis of LOKI'91. Proceedings of AusCrypt'92, Springer Verlag, LNCS 718, 1993.
L.R. Knudsen. New potentially weak keys for DES and LOKI. Unpublished manuscript.
X. Lai, J. L. Massey, S. Murphy. Markov Ciphers and Differential Cryptanalysis. Proceedings of EuroCrypt'91. Springer Verlag, LNCS 547, 1991.
X. Lai. On the Design and Security of Block Ciphers. Thesis, 1992.
M. Matsui. Linear Cryptanalysis Method for DES Cipher. Proceedings of Euro-Crypt'93, Springer Verlag, LNCS 765, 1994.
M. Matsui. Linear Cryptanalysis Method of DES Cipher (I). Private Communications.
K. Nyberg, L.R. Knudsen. Provable Security Against a Differential Attack. To appear in the Journal of Cryptology. A preliminary version appears in the Proceedings of Crypto'92, Springer Verlag, LNCS 740, 1993.
K. Nyberg. Differentially uniform mappings for cryptography. Proceedings of EuroCrypt'93, Springer Verlag, LNCS 765, 1994.
L. J. O'Connor. On the distribution of characteristics in bijective mappings. Proceedings of EuroCrypt'93, Springer Verlag, LNCS 765, 1994.
J.-J. Quisquater, Y. Desmedt, M. Davio. The importance of’ good’ key scheduling schemes. Proceedings of Crypto'85. Springer Verlag, LNCS 218, 1986.
M.J. Wiener. Efficient DES key search. To appear in the proceedings of Crypto'93.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Knudsen, L.R. (1994). Practically secure Feistel ciphers. In: Anderson, R. (eds) Fast Software Encryption. FSE 1993. Lecture Notes in Computer Science, vol 809. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-58108-1_26
Download citation
DOI: https://doi.org/10.1007/3-540-58108-1_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-58108-6
Online ISBN: 978-3-540-48456-1
eBook Packages: Springer Book Archive