Design and cryptanalysis of a new iterative structure

IF 1.3 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Jiajie Liu, Bing Sun, Chao Li
{"title":"Design and cryptanalysis of a new iterative structure","authors":"Jiajie Liu,&nbsp;Bing Sun,&nbsp;Chao Li","doi":"10.1049/ise2.12098","DOIUrl":null,"url":null,"abstract":"<p>This study proposes a new iterative structure called the L-Feistel structure, which shares similar procedures between encryption and decryption and could unify the Feistel structure and the Lai-Massey structure. This paper evaluates the security of the L-Feistel structure from the perspective of provable security and classical analysis, respectively. Firstly, it is proved that the 4-round Key-Alternating L-Feistel cipher with independent round keys and independent round functions is secure against 2<sup><i>n</i>/2</sup> queries that is, birthday-bound security. Then by presenting the dual structure of the L-Feistel structure with SP-type round functions, it is proven that a differential of the L-Feistel structure is impossible when and only when it is a zero-correlation linear hull of its dual structure. Finally, the paper constructs impossible differentials, zero-correlation linear hulls and integral distinguishers of the L-Feistel structure with SP-type round functions which cover six and seven rounds, respectively, under different conditions.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"17 3","pages":"335-346"},"PeriodicalIF":1.3000,"publicationDate":"2022-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/ise2.12098","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Information Security","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/ise2.12098","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 1

Abstract

This study proposes a new iterative structure called the L-Feistel structure, which shares similar procedures between encryption and decryption and could unify the Feistel structure and the Lai-Massey structure. This paper evaluates the security of the L-Feistel structure from the perspective of provable security and classical analysis, respectively. Firstly, it is proved that the 4-round Key-Alternating L-Feistel cipher with independent round keys and independent round functions is secure against 2n/2 queries that is, birthday-bound security. Then by presenting the dual structure of the L-Feistel structure with SP-type round functions, it is proven that a differential of the L-Feistel structure is impossible when and only when it is a zero-correlation linear hull of its dual structure. Finally, the paper constructs impossible differentials, zero-correlation linear hulls and integral distinguishers of the L-Feistel structure with SP-type round functions which cover six and seven rounds, respectively, under different conditions.

Abstract Image

一种新的迭代结构的设计与密码分析
本研究提出了一种新的迭代结构,称为L-Feistel结构,它在加密和解密之间具有相似的过程,可以统一Feistel和Lai-Massey结构。本文分别从可证明安全性和经典分析的角度对L-Feistel结构的安全性进行了评价。首先,证明了具有独立循环密钥和独立循环函数的4循环密钥交替L-Feistel密码对2n/2查询的安全性,即生日界安全性。然后,通过用SP型圆函数表示L-Feistel结构的对偶结构,证明了当且仅当L-Feistell结构是其对偶结构的零相关线性壳时,L-Feistle结构的微分是不可能的。最后,本文构造了L-Feistel结构的不可能微分、零相关线性壳和积分判别器,其SP型圆函数分别覆盖6和7个圆,在不同条件下。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Information Security
IET Information Security 工程技术-计算机:理论方法
CiteScore
3.80
自引率
7.10%
发文量
47
审稿时长
8.6 months
期刊介绍: IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls. Scope: Access Control and Database Security Ad-Hoc Network Aspects Anonymity and E-Voting Authentication Block Ciphers and Hash Functions Blockchain, Bitcoin (Technical aspects only) Broadcast Encryption and Traitor Tracing Combinatorial Aspects Covert Channels and Information Flow Critical Infrastructures Cryptanalysis Dependability Digital Rights Management Digital Signature Schemes Digital Steganography Economic Aspects of Information Security Elliptic Curve Cryptography and Number Theory Embedded Systems Aspects Embedded Systems Security and Forensics Financial Cryptography Firewall Security Formal Methods and Security Verification Human Aspects Information Warfare and Survivability Intrusion Detection Java and XML Security Key Distribution Key Management Malware Multi-Party Computation and Threshold Cryptography Peer-to-peer Security PKIs Public-Key and Hybrid Encryption Quantum Cryptography Risks of using Computers Robust Networks Secret Sharing Secure Electronic Commerce Software Obfuscation Stream Ciphers Trust Models Watermarking and Fingerprinting Special Issues. Current Call for Papers: Security on Mobile and IoT devices - https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信