2021
DOI: 10.1155/2021/5582711
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Impossible Differential Distinguishers of Two Generalized Feistel Structures

Abstract: Impossible differential attack is one of the most effective cryptanalytic methods for block ciphers. Its key step is to construct impossible differential distinguishers as long as possible. In this paper, we mainly focus on constructing longer impossible differential distinguishers for two kinds of generalized Feistel structures which are m -dataline CAST256-like and MARS-like structures. When their round function takes Subs… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…When the linear layer P satisfies γ ( P ) = 2, only 20‐round impossible differentials of the type‐1 4‐branch GFS with SP round functions could be constructed in Ref. [17]. Compared with this result, our result can find the distinguisher 1 more round.…”
Section: Impossible Differentials Of Type‐1 and Type‐1‐like 4‐branch ...mentioning
confidence: 90%
See 3 more Smart Citations
“…When the linear layer P satisfies γ ( P ) = 2, only 20‐round impossible differentials of the type‐1 4‐branch GFS with SP round functions could be constructed in Ref. [17]. Compared with this result, our result can find the distinguisher 1 more round.…”
Section: Impossible Differentials Of Type‐1 and Type‐1‐like 4‐branch ...mentioning
confidence: 90%
“…In the above lemma, we exploit the definitions of the Support and Primitive index to relax the condition of γ ( P ) from γ ( P ) ≥ 3 in Ref. [17] to γ ( P ) ≥ 2 in our paper. With this lemma, a 21‐round impossible differential distinguisher is formulated as the following theorem.…”
Section: Impossible Differentials Of Type‐1 and Type‐1‐like 4‐branch ...mentioning
confidence: 99%
See 2 more Smart Citations
“…The round keys (K[i]), which the key scheduling procedure derives from the seed key, are applied to the internal rounds. The structure facilitates decoding by using reverseordered round keys [5].…”
Section: Introductionmentioning
confidence: 99%