Selected Areas in Cryptography 1997
DOI: 10.1007/978-1-4615-5489-9_4
|View full text |Cite
|
Sign up to set email alerts
|

On Weaknesses of Non—surjective Round Functions

Abstract: We propose a new attack on Feistel ciphers with a non-surjective round function. CAST and LOKI91 are examples of such ciphers. We extend the attack towards ciphers that use a non-uniformly distributed round function and apply the attack to CAST. * N.F.W.O. research assistant, sponsored by the National Fund for Scientific Research (Belgium). † N.F.W.O. postdoctoral researcher, sponsored by the National Fund for Scientific Research (Belgium).

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0

Year Published

1997
1997
2010
2010

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(29 citation statements)
references
References 9 publications
0
29
0
Order By: Relevance
“…In other words, the combined function v • F is non-surjective. Rijmen et al [7] identified several attacks on ciphers with nonsurjective round functions, so this property of SPEED is worrisome.…”
Section: Non-surjectivity Of the Round Functionmentioning
confidence: 99%
See 3 more Smart Citations
“…In other words, the combined function v • F is non-surjective. Rijmen et al [7] identified several attacks on ciphers with nonsurjective round functions, so this property of SPEED is worrisome.…”
Section: Non-surjectivity Of the Round Functionmentioning
confidence: 99%
“…Applying the attack of [7] is not as straightforward as one might hope. There Rijmen et al depend on the fact that the range of the h-function is known and hence one can perform hypothesis testing based upon the combined output of several h-functions.…”
Section: Non-surjectivity Of the Round Functionmentioning
confidence: 99%
See 2 more Smart Citations
“…For a new block cipher algorithm, designers must guarantee that it can resist these two attacks. However, even the security against DC and LC can be proved, the algorithm may suffer other attacks, such as truncated differential attack [13], higher-order differential attack [13,18], impossible differential attack [4,14], boomerang attack [27], amplified boomerang attack [16], rectangle attack [5], integral attack [15], interpolation attack [12], non-surjective attack [24], algebraic attack [8], related-key attack [3], slide attack [1] and so on. Among these methods, integral attack and impossible differential attack are of special importance.…”
Section: Introductionmentioning
confidence: 99%