首页> 外文期刊>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences >Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
【24h】

Known-Key Attacks on Generalized Feistel Schemes with SP Round Function

机译:具有SP Round函数的广义Feistel方案的已知密钥攻击

获取原文
获取原文并翻译 | 示例

摘要

We present attacks on the generalized Feistel schemes, where each round function consists of a subkey XOR, S-boxes, and then a linear transformation (i.e. a Substitution-Permutation (SP) round function). Our techniques are based on rebound attacks. We assume that the S-boxes have a good differential property and the linear transformation has an optimal branch number. Under this assumption, we firstly describe known-key distinguishers on the type-1, -2, and -3 generalized Feistel schemes up to 21,13 and 8 rounds, respectively. Then, we use the distinguishers to make several attacks on hash functions where Merkle-Damgard domain extender is used and the compression function is constructed with Matyas-Meyer-Oseas or Miyaguchi-Preneel hash modes from generalized Feistel schemes. Collision attacks are made for 11 rounds of type-1 Feistel scheme. Near collision attacks are made for 13 rounds of type-1 Feistel scheme and 9 rounds of type-2 Feistel scheme. Half collision attacks are made for 15 rounds of type-1 Feistel scheme, 9 rounds of type-2 Feistel scheme, and 5 rounds of type-3 Feistel scheme.
机译:我们提出了针对广义Feistel方案的攻击,其中每个回合函数均包含一个子键XOR,S盒和一个线性变换(即Substitution-Permutation(SP)回合函数)。我们的技术基于反弹攻击。我们假设S盒具有良好的微分特性,并且线性变换具有最佳分支数。在这种假设下,我们首先描述分别在多达21、13和8轮的类型1,-2和-3广义Feistel方案上的已知密钥区分符。然后,我们使用区分器对使用Merkle-Damgard域扩展器的哈希函数进行几次攻击,并使用Matyas-Meyer-Oseas或Miyaguchi-Preneel哈希模式根据广义Feistel方案构造压缩函数。进行了11轮1型Feistel方案的碰撞攻击。对13轮1型Feistel方案和9轮2型Feistel方案进行了近碰撞攻击。对15轮1型Feistel方案,9轮2型Feistel方案和5轮3型Feistel方案进行半碰撞攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号