feistel ciphers
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 3)

H-INDEX

10
(FIVE YEARS 0)

2021 ◽  
Vol 64 (1) ◽  
pp. 1-28
Author(s):  
N. I. Shepherd-Barron

An effective lower bound on the entropy of some explicit quadratic plane Cremona transformations is given. The motivation is that such transformations (Hénon maps, or Feistel ciphers) are used in symmetric key cryptography. Moreover, a hyperbolic plane Cremona transformation g is rigid, in the sense of [5], and under further explicit conditions some power of g is tight.


Author(s):  
Yingjie Zhang ◽  
Lijun Lyu ◽  
Kexin Qiao ◽  
Zhiyu Zhang ◽  
Siwei Sun ◽  
...  
Keyword(s):  

Author(s):  
Pooya Farshim ◽  
Louiza Khati ◽  
Yannick Seurin ◽  
Damien Vergnaud
Keyword(s):  

2020 ◽  
Vol 64 (1) ◽  
Author(s):  
Yaobin Shen ◽  
Hailun Yan ◽  
Lei Wang ◽  
Xuejia Lai
Keyword(s):  

Author(s):  
Gembu Ito ◽  
Akinori Hosoyamada ◽  
Ryutaroh Matsumoto ◽  
Yu Sasaki ◽  
Tetsu Iwata
Keyword(s):  

Author(s):  
Eli Biham ◽  
Stav Perle

In this paper we introduce a new extension of linear cryptanalysis that may reduce the complexity of attacks by conditioning linear approximations on other linear approximations. We show that the bias of some linear approximations may increase under such conditions, so that after discarding the known plaintexts that do not satisfy the conditions, the bias of the remaining known plaintexts increases. We show that this extension can lead to improvements of attacks, which may require fewer known plaintexts and time of analysis. We present several types of such conditions, including one that is especially useful for the analysis of Feistel ciphers. We exemplify the usage of such conditions for attacks by a careful application of our extension to Matsui’s attack on the full 16-round DES, which succeeds to reduce the complexity of the best attack on DES to less than 242. We programmed a test implementation of our attack and verified our claimed results with a large number of runs. We also introduce a new type of approximations, to which we call scattered approximations, and discuss its applications.


Cryptologia ◽  
2018 ◽  
Vol 42 (5) ◽  
pp. 427-444 ◽  
Author(s):  
Nicolas Courtois ◽  
Jörg Drobick ◽  
Klaus Schmeh
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document