“…ey presented a 13-round known-key distinguishing attack on GFN-2 and 9-round 1-word and 2-word partialcollision attacks on Matyas-Meyer-Oseas and Miyaguchi-Preneel hash modes of GFN-2. In this paper, we improve the results for GFN-2 in [4] and also present known-key distinguishing and partial-collision attacks for the cases of t � 6 and t � 8. Our results are summarized as follows:…”
Section: Introductionmentioning
confidence: 86%
“…In 2011, Sasaki and Yasuda used the rebound technique [2] to construct known-key distinguishers for the Feistel network whose Ffunction consists of cryptographically strong S-boxes and an MDS matrix and showed that those distinguishers are converted into partial-collision attacks on hash modes [3]. Later, their results have been applied to variants of the Feistel network [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…It has been researched for secure and efficient block cipher design. In [4], Kang et al presented known-key attacks on three types of generalized Feistel network (GFN) proposed by Nyberg [10]. Particularly, Type-II GFN (GFN-2) is well-balanced like Feistel network and suitable for lightweight designs because the iteration of the relatively small F-function makes a largeblock-length block cipher.…”
Section: Introductionmentioning
confidence: 99%
“…e block length of GFN-2 with the parameters t, a, and b is abt bits. We restrict (a, b) to (4,4), (4,8), (8,4), and (8, 8) and t to 4, 6, and 8, which are mainly used and considered in block cipher designs.…”
Section: Introductionmentioning
confidence: 99%
“…In [4], Kang et al analyzed only t � 4 cases of GFNs and assumed that the last-round function has no shuffle operation. ey presented a 13-round known-key distinguishing attack on GFN-2 and 9-round 1-word and 2-word partialcollision attacks on Matyas-Meyer-Oseas and Miyaguchi-Preneel hash modes of GFN-2.…”
We study known-key distinguishing and partial-collision attacks on GFN-2 structures with various block lengths in this paper. For 4-branch GFN-2, we present 15-round known-key distinguishing attack and 11-round partial-collision attack which improve previous results. We also present 17-round known-key distinguishing attack on 6-branch GFN-2 and 27-round known-key distinguishing attack on 8-branch GFN-2 and show that several partial-collision attacks are derived from them. Additionally, some attacks are valid under special conditions for the F-function.
“…ey presented a 13-round known-key distinguishing attack on GFN-2 and 9-round 1-word and 2-word partialcollision attacks on Matyas-Meyer-Oseas and Miyaguchi-Preneel hash modes of GFN-2. In this paper, we improve the results for GFN-2 in [4] and also present known-key distinguishing and partial-collision attacks for the cases of t � 6 and t � 8. Our results are summarized as follows:…”
Section: Introductionmentioning
confidence: 86%
“…In 2011, Sasaki and Yasuda used the rebound technique [2] to construct known-key distinguishers for the Feistel network whose Ffunction consists of cryptographically strong S-boxes and an MDS matrix and showed that those distinguishers are converted into partial-collision attacks on hash modes [3]. Later, their results have been applied to variants of the Feistel network [4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…It has been researched for secure and efficient block cipher design. In [4], Kang et al presented known-key attacks on three types of generalized Feistel network (GFN) proposed by Nyberg [10]. Particularly, Type-II GFN (GFN-2) is well-balanced like Feistel network and suitable for lightweight designs because the iteration of the relatively small F-function makes a largeblock-length block cipher.…”
Section: Introductionmentioning
confidence: 99%
“…e block length of GFN-2 with the parameters t, a, and b is abt bits. We restrict (a, b) to (4,4), (4,8), (8,4), and (8, 8) and t to 4, 6, and 8, which are mainly used and considered in block cipher designs.…”
Section: Introductionmentioning
confidence: 99%
“…In [4], Kang et al analyzed only t � 4 cases of GFNs and assumed that the last-round function has no shuffle operation. ey presented a 13-round known-key distinguishing attack on GFN-2 and 9-round 1-word and 2-word partialcollision attacks on Matyas-Meyer-Oseas and Miyaguchi-Preneel hash modes of GFN-2.…”
We study known-key distinguishing and partial-collision attacks on GFN-2 structures with various block lengths in this paper. For 4-branch GFN-2, we present 15-round known-key distinguishing attack and 11-round partial-collision attack which improve previous results. We also present 17-round known-key distinguishing attack on 6-branch GFN-2 and 27-round known-key distinguishing attack on 8-branch GFN-2 and show that several partial-collision attacks are derived from them. Additionally, some attacks are valid under special conditions for the F-function.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.