Vaudenay, Serge2007-01-182007-01-182007-01-18199610.1007/3-540-60865-6_39https://infoscience.epfl.ch/handle/20.500.14299/239657Blowfish (Schneier, 1994) is a sixteen-rounds Feistel cipher (Feistel, 1973) in which the F function is a part of the private key. We show that the disclosure of F allows to perform a differential cryptanalysis which can recover all the rest of the key with 2<sup>48</sup> chosen plaintexts against a number of rounds reduced to eight. Moreover, for some weak F function, this attack only needs 2<sup>23</sup> chosen plaintexts against eight rounds, and 3Ã 2<sup>51</sup> chosen plaintexts against sixteen-rounds. When the F function is safely kept private, one can detect whether it is weak or not with a differential attack using 2<sup>22</sup> plaintexts against eight roundsOn the weak keys of Blowfishtext::conference output::conference proceedings::conference paper