Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
 
conference paper

Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains

Durak, F. Betül
•
Vaudenay, Serge  
2018
ACNS 2018: Applied Cryptography and Network Security
Applied Cryptography and Network Security (ACNS)

Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when the domain size of a branch (called $N$) is small. We investigate round-function-recovery attacks. The best known attack so far is an improvement of Meet-In-The-Middle (MITM) attack by Isobe and Shibutani from ASIACRYPT~2013 with optimal data complexity $q=r \frac{N}{2}$ and time complexity $N^{ \frac{r-4}{2}N + o(N)}$, where $r$ is the round number in FN. We construct an algorithm with a surprisingly better complexity when $r$ is too low, based on partial exhaustive search. When the data complexity varies from the optimal to the one of a codebook attack $q=N^2$, our time complexity can reach $N^{O \left( N^{1-\frac{1}{r-2}} \right) }$. It crosses the complexity of the improved MITM for $q\sim N\frac{\mathrm{e}^3}{r}2^{r-3}$. We also estimate the lowest secure number of rounds depending on $N$ and the security goal. We show that the format-preserving-encryption schemes FF1 and FF3 standardized by NIST and ANSI cannot offer 128-bit security (as they are supposed to) for $N\leq11$ and $N\leq17$, respectively (the NIST standard only requires $N \geq 10$), and we improve the results by Durak and Vaudenay from CRYPTO~2017.

  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-319-93387-0_23
Author(s)
Durak, F. Betül
Vaudenay, Serge  
Date Issued

2018

Published in
ACNS 2018: Applied Cryptography and Network Security
Start page

440

End page

458

URL

ACNS Version

https://link.springer.com/chapter/10.1007%2F978-3-319-93387-0_23
Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event name
Applied Cryptography and Network Security (ACNS)
Available on Infoscience
July 18, 2018
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/147408
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés