Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kang, HyungChul | - |
dc.contributor.author | Hong, Deukjo | - |
dc.contributor.author | Moon, Dukjae | - |
dc.contributor.author | Kwon, Daesung | - |
dc.contributor.author | Sung, Jaechul | - |
dc.contributor.author | Hong, Seokhie | - |
dc.date.accessioned | 2021-09-06T16:08:12Z | - |
dc.date.available | 2021-09-06T16:08:12Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-09 | - |
dc.identifier.issn | 0916-8508 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/107594 | - |
dc.description.abstract | We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21, 13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgard domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Known-Key Attacks on Generalized Feistel Schemes with SP Round Function | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Hong, Seokhie | - |
dc.identifier.doi | 10.1587/transfun.E95.A.1550 | - |
dc.identifier.scopusid | 2-s2.0-84865732721 | - |
dc.identifier.wosid | 000309043100014 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E95A, no.9, pp.1550 - 1560 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.title | IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | - |
dc.citation.volume | E95A | - |
dc.citation.number | 9 | - |
dc.citation.startPage | 1550 | - |
dc.citation.endPage | 1560 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordAuthor | generalized Feistel schemes | - |
dc.subject.keywordAuthor | rebound attack | - |
dc.subject.keywordAuthor | known-key distinguisher | - |
dc.subject.keywordAuthor | collision attack | - |
dc.subject.keywordAuthor | hashing mode | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.