2021
DOI: 10.1007/978-3-030-84242-0_3
|View full text |Cite
|
Sign up to set email alerts
|

Linear Cryptanalysis of FF3-1 and FEA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…The cryptanalysis of standardised FPE algorithms showed that the attacks on the FPE algorithms using differential distinguishers are more complex and require more data for the FF3-1 algorithm compared to the FEA standards [28]. In addition, linear cryptanalysis of the FPE algorithms [29] revealed that attacks on FF3-1 are more time-consuming compared to other algorithms in terms of encryption operations, thereby highlighting its enhanced security. Finally, the FF3-1 algorithm's ability to encrypt binary words ranging from 20 to 192 bits in length made it particularly suitable for encrypting specific protocol fields in our system.…”
Section: Format-preserving Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…The cryptanalysis of standardised FPE algorithms showed that the attacks on the FPE algorithms using differential distinguishers are more complex and require more data for the FF3-1 algorithm compared to the FEA standards [28]. In addition, linear cryptanalysis of the FPE algorithms [29] revealed that attacks on FF3-1 are more time-consuming compared to other algorithms in terms of encryption operations, thereby highlighting its enhanced security. Finally, the FF3-1 algorithm's ability to encrypt binary words ranging from 20 to 192 bits in length made it particularly suitable for encrypting specific protocol fields in our system.…”
Section: Format-preserving Encryptionmentioning
confidence: 99%
“…FPE specifications, although relatively young compared to the well-known block cipher symmetric cryptographic algorithms, have attracted attention from cryptanalysts. These experts have identified potential vulnerabilities in FPE schemes, particularly highlighting a decrease in the complexity of attacks, especially for shorter plaintext lengths and under specific circumstances, such as when the adversary has knowledge of the tweak parameter [29,30]. In the context of LISPP, these issues are effectively mitigated, as the plaintext lengths utilised exceed those susceptible to such vulnerabilities, and the tweak parameter never leaves the network element, ensuring its confidentiality.…”
Section: Format-preserving Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Theorem 1 (Theorem 4.1. [Bey21]). Let z be a random variable on F d 2 , V ⊆ F d 2 a vector space and V ⊥ an orthogonal complement of the subspace V .…”
Section: Preliminariesmentioning
confidence: 99%
“…To determine the correlation of the iterative trail in Figure 2, we use the following result due to Daemen and Rijmen [DR07]. The formulation in Theorem 2 is due to [Bey21]. Theorem 2 (Theorem 3.1.…”
Section: Generic Multidimensional Linear Distinguishersmentioning
confidence: 99%