Differential Attacks on Generalized Feistel Schemes Val erie Nachef - - PowerPoint PPT Presentation

differential attacks on generalized feistel schemes
SMART_READER_LITE
LIVE PREVIEW

Differential Attacks on Generalized Feistel Schemes Val erie Nachef - - PowerPoint PPT Presentation

Differential Attacks on Generalized Feistel Schemes Val erie Nachef - Emmanuel Volte - Jacques Patarin CANS 2013 20 November 2013 Outline Introduction 1 State of the Art Our Contribution Definition of the schemes Attacks on Type-1


slide-1
SLIDE 1

Differential Attacks on Generalized Feistel Schemes

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin CANS 2013 20 November 2013

slide-2
SLIDE 2

Outline

1

Introduction State of the Art Our Contribution Definition of the schemes

2

Attacks on Type-1 Feistel Schemes Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

3

Examples and Complexities for Type-2, Type-3 and Alternating Schemes Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

4

Conclusion

slide-3
SLIDE 3

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Outline

1

Introduction State of the Art Our Contribution Definition of the schemes

2

Attacks on Type-1 Feistel Schemes

3

Examples and Complexities for Type-2, Type-3 and Alternating Schemes

4

Conclusion

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-4
SLIDE 4

Classical Feistel Schemes

Encryption

f1 f2 fn

Decryption

fn fn−1 f1

slide-5
SLIDE 5

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Generalization of Feistel Schemes

Construction of permutations from {0, 1}kn to {0, 1}kn using different kinds of round functions: Contracting Feistel schemes, Expanding Feistel schemes. Type-1, Type-2, Type-3 Feistel schemes. Alternating Feistel schemes. Schemes used in: CAST 256, MARS, RC6, BEAR-LION....

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-6
SLIDE 6

Previous Attacks on Generalized Feistel Schemes

Different kinds of attacks: Differential Attacks (KPA, CPA-1) on contracting and expanding Feistel Schemes. (Jutla, Patarin, Nachef, Volte, Berbain) Impossible Differential Attacks on Type 1, Type 2, Type-3 Feistel schemes. (Bouillaguet, Dunkelman, Fouque, Leurent, Kim, Hong, Lee, Lim, Sung) Impossible Boomerang Attacks on Type 1, Type 2, Type-3 Feistel schemes. (Choy, Yap)

slide-7
SLIDE 7

Our aim

Distinguish a random permutation from a permutation generated by the scheme. Determine the number of messages needed to distinguish according to the number of rounds in Known Plaintext Attacks (KPA) and Non Adaptive Chosen Plaintext Attacks (CPA-1). We need to impose conditions on the inputs and on the outputs. Provide the maximal number of rounds reached by the attacks.

slide-8
SLIDE 8

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Differential Attacks versus Impossible Differential Attacks

Structure KPA CPA-1 Impossible Differential bijective any Type-1 k2 + 2k − 2 k2 + k − 1 k2 + k − 1 k2 Type-2 2k + 2 2k + 1 2k + 1 N/A Type-3 k + ⌊ k

2⌋ + 1

k + 1 k + 2 N/A Alternating 3k 3k N/A N/A

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-9
SLIDE 9

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Type-1 Feistel Schemes: First round

I1 I2 I3 Ik n bits f 1

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-10
SLIDE 10

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Type-2 Feistel Schemes: First round

I1 I2 I3 I4 Ik n bits f 1

1

f 1

2

f 1

k/2

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-11
SLIDE 11

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Type-3 Feistel Schemes: First round

I1 I2 I3 Ik n bits f 1

1

f 1

2

f 1

3

f 1

k−1

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-12
SLIDE 12

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion State of the Art Our Contribution Definition of the schemes

Alternating Feistel Schemes: First two rounds

kn bits n (k − 1)n

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-13
SLIDE 13

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Outline

1

Introduction

2

Attacks on Type-1 Feistel Schemes Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

3

Examples and Complexities for Type-2, Type-3 and Alternating Schemes

4

Conclusion

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-14
SLIDE 14

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Notation

Input I = [I1, I2, . . . , Ik]. → Output S = [S1, S2, . . . , Sk] f1 = first round function {0, 1}n → {0, 1}n Output= [I2 ⊕ f (1)(I1), I3, I4, . . . , Ik, I1] Let X 1 = I2 ⊕ f (1)(I1). X 1 is called an internal variable.

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-15
SLIDE 15

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Internal Variables

New Internal Variables X j at round j, where S1 = X j 1 ≤ r ≤ k − 1, X r = Ir+1 ⊕ f r(X r−1) X k = I1 ⊕ f k(X k−1) ∀r, r ≥ 1, ∀j, 1 ≤ j ≤ k, X rk+j = X (r−1)k+j ⊕ f rk+j(X rk+j−1)

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-16
SLIDE 16

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Differential Notation

Plaintext/ciphertext pairs Input variables: [0, 0, 0, ∆0

4, . . . , ∆0 k]

KPA: For(i, j), I1(i) = I1(j), I2(i) = I2(j) and I3(i) = I3(j) CPA-1: I1, I2, I3 are given constant values After r rounds Output Variables: [0, ∆0

ℓ, ∆r 3, . . . , ∆r k]

For (i, j), S1(i) = S1(j) and S2(i) ⊕ S2(j) = Iℓ(i) ⊕ Iℓ(j)

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-17
SLIDE 17

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Internal Variables and Differential Characteristics

Intermediate round r, r ≥ k Output: [X r, X r−k+1, X r−k+2, . . . , X r−1] Condition imposed on this output: [0, ∆r

2, ∆r 3, . . . , ∆r k]

⇒ for (i, j), X r(i) = X r(j) Propagation of the differential characteristics: after round r + 1, [∆r

2, ∆r 3, . . . , ∆r k, 0]

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-18
SLIDE 18

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Overview of the Attacks

Conditions on the inputs and the outputs Conditions on the internal variables ⇒ Propagation of the characteristics Count the number of plaintext/ciphertext pairs satisfying the input and output conditions Nperm for a permutation and Nscheme for a scheme Compute and compare the expectancies E(Nperm) and E(Nscheme)

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-19
SLIDE 19

CPA-1 on 2k − 2 rounds with 2 messages

round ... ∆0

k

1 ... ∆0

k

. . . k − 2 ∆0

k

. . . k − 1 ∆0

k

... k ∆k

1

... ∆0

k

k + 1 ∆k+1

1

... ∆0

k

∆k

1

. . . 2k − 2 ∆2k−2

1

∆0

k

∆k

1

... ∆2k−4

1

∆2k−3

1

slide-20
SLIDE 20

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Details of the Attack

Choose 2 distinct messages I(1) and I(2) such that I1(1) = I1(2), . . . Ik−1(1) = Ik−1(2) With a scheme : Pr[S2(1) ⊕ S2(2) = Ik(1) ⊕ Ik(2)] = 1 With a random permutation: Pr[S2(1) ⊕ S2(2) = Ik(1) ⊕ Ik(2)] = 1 2n

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-21
SLIDE 21

KPA on 2k − 1 rounds with 2

n 2 messages

round ∆0

1

∆0

2

∆0

3

... ∆0

k−1

∆0

k

1 ... ∆0

1

2 ... ∆0

1

. . . k − 1 ∆0

1

... k ∆0

1

... k + 1 ... ∆0

1

. . . 2k − 2 ∆2k−2

1

∆0

1

... 2k − 1 ∆2k−1

1

∆0

1

...

slide-22
SLIDE 22

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Details of the Attack

Generate m messages Compute the number of input/output pairs (i, j) such that S2(i) ⊕ S2(j) = I1(i) ⊕ I1(j) E(Nperm) ≃ m2

2.2n

E(Nscheme) ≃ m2

2n since S2(i) ⊕ S2(j) = Ik(i) ⊕ Ik(j) happens

at random or because X k−1(i) = X k−1(j) m ≃ 2

n 2 ⇒ SUCCESS Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-23
SLIDE 23

CPA-1 on 3k − 2 rounds with 2

n 2 messages

round ... ∆0

k

1 ... ∆0

k

. . . k − 2 ∆0

k

. . . k − 1 ∆0

k

... k ∆k

1

... ∆0

k

k + 1 ∆k+1

1

... ∆0

k

∆k

1

. . . 2k − 2 ∆0

k

∆k

1

... ∆2k−4

1

∆2k−3

1

2k − 1 ∆0k ∆k

1

∆k+1

1

... ∆2k−3

1

2k ∆2k

1

∆k+1

1

∆k+2

1

... ∆0

k

. . . 3k − 3 ∆3k−3

1

∆0

k

... ∆3k−5

1

∆3k−4

1

3k − 2 ∆3k−2

1

∆0

k

∆2k

1

... ∆3k−4

1

∆3k−3

1

slide-24
SLIDE 24

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Details of the Attack

Choose m messages suck that I1, I2, . . . Ik−1 are given constant values Compute the number of input/output pairs (i, j) such that S2(i) ⊕ S2(j) = Ik(i) ⊕ Ik(j) E(Nperm) ≃ m2

2.2n

E(Nscheme) ≃ m2

2n since S2(i) ⊕ S2(j) = Ik(i) ⊕ Ik(j) happens

at random or because X 2k−2(i) = X 2k−2(j) m ≃ 2

n 2 ⇒ SUCCESS Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-25
SLIDE 25

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Covariance Formula

Sufficient condition for Success using the standard deviation |E(Nperm) − E(Nscheme)| > max{σ(Nscheme), σ(Nperm)} Covariance formula x1, . . . xn are random variables, V denotes the variance V (

n

  • i=1

xi) =

n

  • i=1

V (xi) + 2

n−1

  • i=1

n

  • j=i+1
  • E(xi xj) − E(xi)E(xj)
  • Val´

erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-26
SLIDE 26

CPA-1 on 4k − 1 rounds with 22n messages

round ∆0

2

∆0

3

... ∆0

k

1 ∆0

2

∆0

3

∆0

4

... . . . k − 1 ∆k−1

1

∆0

2

... ∆k−2

1

k ∆0

2

∆2

1

... ∆k−1

1

k + 1 ∆0

2

∆2

1

∆3

1

.. . . . 2k ∆0

2

∆k+2

1

... ∆2k−1

1

. . . 3k ∆0

2

∆2k+2

1

... ∆3k−1

1

. . . 4k − 1 ∆4k−1

1

∆0

2

... ∆4k−2

1

slide-27
SLIDE 27

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Details of the Attack

Generate m messages such that I1 is a constant value Introduce random variables δij: δij = 1 ⇒ S2(i) = S2(j) S3(i) ⊕ S3(j) = I2(i) ⊕ I2(j) δij = 0

  • therwise

Then N =

i<j δij

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-28
SLIDE 28

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Finalization of the Attack

E(Nperm) ≃

m2 2.22n and σ(Nperm) ≃ m √ 2.2n

E(Nscheme) ≃

m2 2.22n + O( m2 23n ) and σ(Nscheme) ≃ m √ 2.2n

If m ≃ 22n, then |E(Nperm) − E(Nscheme)| > max{σ(Nscheme), σ(Nperm)}

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-29
SLIDE 29

Sketch of the Computations for Type-1 Schemes

After 4k − 1 rounds: [S1, S2, S3, . . . , Sk] = [X 4k−1, X 3k, X 3k+1, . . . , X 4k−2] S3 = I2 ⊕ f 1(I1) ⊕ f k+1(X k) ⊕ f 2k+1(X 2k) ⊕ f 3k+1(X 3k) Conditions on internal variables S2(i) = S2(j), and I2(i) ⊕ I2(j) = S3(i) ⊕ S3(j) ⇐ ⇒ X 3k(i) = X 3k(j) and f k+1(X k(i)) ⊕ f 2k+1(X 2k(i)) = f k+1(X k(j)) ⊕ f 2k+1(X 2k(j))

slide-30
SLIDE 30

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Notation The first rounds : Simple Attacks Use of the variance Simulation results and Complexities

Experimental Results for CPA-1 on k2 + k − 1 rounds

k n % of success −% of false alarm # iterations 6 2 67% 10000 8 2 66,5% 10000 9 2 66% 10000 6 4 95% 10000 8 4 96% 10000 4 6 99,5% 10000

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-31
SLIDE 31

Complexities of CPA-1 on Type-1 Feistel Schemes

r rounds CPA-1 r rounds CPA-1 1 . . . 1 . . . k − 1 k pk − (p − 2) . . . 2 . . . 2(p−2)n 2k − 2 (p + 1)k − p 2k − 1 . . . 2n/2 . . . 3k − 2 3k − 1 k2 + 1 . . . 2n . . . 2(k−1)n 4k − 3 k2 + k − 1

slide-32
SLIDE 32

Complexities of KPA on Type-1 Feistel Schemes

r rounds KPA 1 → k − 1 1 k → 2k − 1 2n/2 2k → 3k − 2 2n . . . rk − 2 2(r−2)n rk − 1 2(r−3/2)n rk . . . 2(r−1)n (r + 1)k − 2 . . . k2 + 2k − 2 2kn

slide-33
SLIDE 33

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

Outline

1

Introduction

2

Attacks on Type-1 Feistel Schemes

3

Examples and Complexities for Type-2, Type-3 and Alternating Schemes Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

4

Conclusion

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-34
SLIDE 34

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

Type-2 Feistel scheme: CPA-1 on 2k − 1 rounds

I1, I2, I3 are given constant values Differential E(Nperm) E(Nscheme) σ m ∆2k−1

4

= 0

m2 2.22n m2 2.22n + O( m2 2(k−2)n ) m √ 22n

2(k−3)n ∆2k−1

5

= ∆0

4

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-35
SLIDE 35

Differential Characteristics

rounds ∆0

4 ∆0 5 ∆0 6 ... ∆0 k−3 ∆0 k−2 ∆0 k−1 ∆0 k

1 ∆0

4

... 2 ∆0

4

... 3 ∆0

4

... 4 ... ∆0

4

5 ... ∆0

4

6 ... ∆0

4

. . . k ∆0

4

... k + 1 ∆0

4

... k + 2 ∆0

4

... k + 3 ∆0

4

... . . . 2k − 2 ∆0

4 ...

2k − 1 ∆0

4

...

slide-36
SLIDE 36

Complexities of the Attacks on Type-2 Feistel Schemes

r rounds KPA CPA-1 1 1 1 2 2n/2 2 3 ≤ r ≤ k 2

r−2 2 n

2 k + 1 2(k−1/2)n 2n/2 k + 1 2

k 2 n

2n/2 k + 3 ≤ r ≤ 2k + 2 2

r−2 2 n

2(r−k−2)n

slide-37
SLIDE 37

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

Type-3 Feistel scheme: CPA-1 on k + 1 rounds

I1, I2, . . . , Ik−1 are given constant values Differential E(Nperm) E(Nscheme) σ m ∆k+1

k−1 = ∆0 k m2 2.2n m2 2.2n + O( m2 2n ) m √ 22

n 2

2

n 2 Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-38
SLIDE 38

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

Differential Characteristics

round ... ∆0

k

1 ... ∆0

k

2 ... ∆0

k

. . . k − 2 ∆0

k

. . . k − 1 ∆0

k

. . . k ... ∆0

k

k + 1 ... ∆0

k

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-39
SLIDE 39

Complexities of the Attacks on Type-3 Feistel Schemes

r rounds KPA CPA-1 1 1 1 2 2n/2 2 3 2n 2 . . . k 2(k−1)n/2 2 k + 1 2

k 2 n

2n/2 k + 2 ≤ r ≤ k + ⌊ k

2⌋ + 1

2(r−⌊ k

2 ⌋−1)n

2(r−⌊ k

2 ⌋−1)n

slide-40
SLIDE 40

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

Alternating Feistel scheme: KPA on 2r rounds r > k

Differential E(Nperm) E(Nscheme) σ m ∆2r

1 = 0 m2 2.2kn m2 2.2kn + O( m2 2rn ) m √ 2.2

kn 2

2(r− k

2 )n

∆2r = ∆0 ∆0 = [∆0

2, . . . , ∆0 k] and ∆2r = [∆2r 2 , . . . , ∆2r k ]

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-41
SLIDE 41

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion Type-2 Feistel Schemes Type-3 Feistel Schemes Alternating Feistel Schemes

Differential Characteristics

r rounds ∆0

1

∆0 1 ∆0 2 ∆0 3 ∆0 4 ∆0 . . . . . . . . . 2r − 1 ∆0 2r ∆0

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-42
SLIDE 42

Complexities of the Attacks on Alternating Feistel Schemes

r rounds KPA 1 1 2 2n/2 3 2n/2 . . . 3 ≤ r ≤ 2k + 1 2(

⌊ r 2 ⌋ 2 )n

. . . 2k + 1 2

kn 2

. . . 2k + 1 ≤ r ≤ 3k 2( (r−k)

2

)n

. . . 3k 2kn

slide-43
SLIDE 43

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion

Outline

1

Introduction

2

Attacks on Type-1 Feistel Schemes

3

Examples and Complexities for Type-2, Type-3 and Alternating Schemes

4

Conclusion

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-44
SLIDE 44

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion

Conclusion

Attacks on Type-1, Type-2, Type-3 and Alternating Feistel schemes such that No condition on the round functions. Maximal number of rounds to be reached. Complexities of the attacks on intermediate rounds. Important tool for our attacks: the use of mean values and standard deviations of well defined random variables

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes

slide-45
SLIDE 45

Introduction Attacks on Type-1 Feistel Schemes Examples and Complexities for Type-2, Type-3 and Alternating Schemes Conclusion

Thank You For Your Attention ! Obrigado pela sua aten¸ c˜ ao !

Val´ erie Nachef - Emmanuel Volte - Jacques Patarin Differential Attacks on Generalized Feistel Schemes