Abstract
In this chapter, we present concrete ciphers based on the constructions studied previously. We provide examples of balanced, unbalanced and generalized Feistel ciphers. For each of them, we give the description and a survey of attacks performed on these ciphers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abdelraheem, M.A., Alizadeh, J., Alkhzaimi, H., Aref, M.R., Bagheri, N., Gauravaram, P.: Improved linear cryptanalysis of reduced-round SIMON-32 and SIMON-48. In: Biryukov, A., Goya, V. (eds.), Progress in Cryptology? INDOCRYPT 2015, vol. 9462, Lecture Notes in Computer Science, pp. 153–179. Springer, Heidelberg (2015)
Abed, F., List, E., Lucks, S., Wenzel, J.: Differential cryptanalysis of round-reduced SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.), Fast Software Encryption – FSE 2014, pp. 546–570. Springer, Berlin, Heidelberg (2015)
Ahmadian, Z., Rasoolzadeh, S., Salmasizadeh, M., Aref, M.R.: Automated dynamic cube attack on block ciphers: cryptanalysis of SIMON and KATAN, in Cryptology ePrint Archive, Report 2015/26136
Anderson, R., Biham, E.: Two practical and provably secure block ciphers: BEAR and LION. In: Golmann, D. (ed.), Fast Software Encryption – FSE ’96, vol. 1039, Lecture Notes in Computer Science, pp. 113–120. Springer, Heidelberg (1996)
Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The SIMON and SPECK families of lightweight block ciphers, in Cryptology ePrint Archive, Report 2013/404
Biham, E., Dunkelman, O., Keller, N.: Improved slide attacks. In: Biryukov, A. (ed.), Fast Software Encryption – FSE ’07, vol. 4593, Lecture Notes in Computer Science, pp. 153–166. Springer, Heidelberg (2007)
Biryukov, A., Roy, A., Velichkov, V.: Differential analysis of block ciphers SIMON and SPECK. In: Cid, C., Rechberger, C. (eds.), Fast Software Encryption – FSE 2014, pp. 546–570. Springer, Berlin, Heidelberg (2015)
Blondeau, C.: Improbable differential from impossible differential: on the validity of the model. In: Paul, G., Vaudenay, S. (eds.), Progress in Cryptology – INDOCRYPT ’13, vol. 6498, Lecture Notes in Computer Science, pp. 149–160. Springer, Heidelberg (2013)
Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.), Advances in Cryptology – ASIACRYPT 2012, vol. 7658, Lecture Notes in Computer Science, pp. 244–261. Springer, Heidelberg (2012)
Bogdanov, A., Geng, H., Wang, M., Wen, L., Collard, B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standard Camellia and CLEFIA. In: Lange, T., Lauter, K., Lisonek, P. (eds.), Selected Areas in Cryptography – SAC ’13, vol. 8282, Lecture Notes in Computer Science, pp. 306–324 Springer, Heidelberg (2014)
Chen, H., Wu, W.L., Feng, D.G.: Differential fault analysis on CLEFIA. In: Qing, S., Imai, H., Wang, G. (eds.), Information and Communications Security – ICICS 2007, vol. 4861, Lecture Notes in Computer Science, pp. 284–295 Springer, Heidelberg (2007)
Courtois, N.T.: Security evaluation if GOST 28147–89 in view of national standardization, in Cryptology ePrint Archive: Report 2011/211
Courtois, N.T., Misztal, M.: Differential cryptanaysis of GOST, in Cryptology ePrint Archive: Report 2011/312
Courtois, N.T.: An improved differential attacks on full GOST. In: Ryan, P.Y.A., Naccache, D., Quisquater, J.J. (eds.), The New Codebreakers, vol. 9100, Lecture Notes in Computer Science, pp. 282–303 Springer, Heidelberg (2016)
Courtois, N.T., Sepehrdad, P., Sušil, P., Vaudenay, S.: ElimLin Algorithm Revisited, pp. 306–325. Springer, Berlin, Heidelberg (2012)
Diffie W., Ledin, G. (translators): SMS4 Encryption Algorithm for Wireless Networks, in Cryptology ePrint Archive: Report 2008/329
Dinur I., Dunkelman, O., Shamir, A.: Improved attacks on full GOST cipher. In: Canteaut, A. (ed.), Fast Software Encryption – FSE ’12, vol. 7549, Lecture Notes in Computer Science, pp. 9–28 Springer, Heidelberg (2012)
Fleischmann, E., Gorski, M., Hüehne, J., Lucks, S.: Key recovery attack on full GOST block cipher with negligible time and memory. WEWoRC ’09, Lecture Notes in Computer Science. Springer, Heidelberg (2009)
Goubin, L., Ivasco, M., Jalby, W., Ly, O., Nachef, V., Patarin, J., Treger, J., Volte, E;: CRUNCH. Submission to NIST, October 2008
Isobe, T.: A single-key attack on the full GOST cipher. In: Joux, A. (ed.), Fast Software Encryption – FSE ’11, vol. 6733, Lecture Notes in Computer Science, pp. 290–305 Springer, Heidelberg (2011)
Kara, O.: Reflection cryptanalysis of some ciphers. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.), Progress in Cryptology – INDOCRYPT ’08, vol. 5365, Lecture Notes in Computer Science, pp. 294–307. Springer, Heidelberg (2008)
Kölbl, S., Leander G., Tiessen, T.: Observations on the SIMON block cipher family, in Cryptology ePrint Archive: Report 2015/145
Ko, Y., Hong, S.H., Lee, W.I., Lee, S.J., Kang, J.S.: Related key differential attacks on 27 rounds of XTEA and full-round GOST. In: Roy, B.K., Meier, W. (eds.), Fast Software Encryption – FSE ’04, vol. 3017, Lecture Notes in Computer Science, pp. 299–316 Springer, Heidelberg (2004)
Li, L., Jia, K., Wang, X., Dong, X.: Meet-in-the-middle technique for truncated differential and its applications to CLEFIA. In: Leander, G. (ed.), Fast Software Encryption – FSE ’15, vol. 9054, Lecture Notes in Computer Science, pp. 48–70 Springer, Heidelberg (2015)
Li, Y., Wu, W., Zhang, L: Improved integral attacks on reduced-round CLEFIA block cipher. In: Jung, S., Yung, M. (eds.), WISA ’11, vol. 7115, Lecture Notes in Computer Science, pp. 28–39. Springer, Heidelberg (2011)
Morin, P.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standard camellia and CLEFIA. Selected Areas in Cryptography – SAC ’96, Lecture Notes in Computer Science, pp. 30–37. Springer, Heidelberg (1996)
Maines, L., Piva, M., Rimoldi, A., Sala, M.: On the provable security of BEAR and LION schemes. AAECC 22 (3), 413–423 (2011)
Nakahara, J.J., Rasmussen, M.: Linear analysis of reduced-round CAST-128 and CAST-256. SBSEG ’07, pp. 45–55 (2007)
Raddum, H.: Algebraic Analysis of the Simon Block Cipher Family, pp. 157–169. Springer International Publishing, Cham (2015)
Schneier, B.: Applied Cryptography, 2nd edn. Protocols, Algorithms, and Source Code. C. Wiley, New York (1994)
Seki, K., Kaneko, T.: Differential Cryptanalysis on Reduced Rounds of GOST. In: Stinson, D.R., Tavares, S.E. (eds.) Selected Areas in Cryptography – SAC ’00, vol. 2012, Lecture Notes in Computer Science, pp. 315–323 Springer, Heidelberg (2001)
Seki, K., Kaneko, T.: Differential cryptanalysis of CAST-256 reduced to nine quad-rounds. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E844 (4), 913–918 (2009)
Shirai, T., Shibutani, K., Moriai, S., Iwata, T.: The 128-bit block cipher CLEFIA (estended abstract). In: Biryukov, A. (ed.), Fast Software Encryption – FSE ’07, vol. 4593, Lecture Notes in Computer Science, pp. 181–195 Springer, Heidelberg (2007)
Sony Corporation: The 128-bit Block Cipher CLEFIA, Security and Performance Evaluations, Revision 1.0, June 1, 2007. Available at http://www.sony.co.jp/Products/clefia/technical/data/clefia-eval-1.0.pdf
Su, B.Z., WU, W.L., Zhang, W.T.: Security of the SMS block cipher against differential cryptanalysis. J. Comput. Sci. Technol. 26 (1), 130–138 (2011)
Teczan, C.H.: The improbable differential attack: cryptanalysis of reduced-round CLEFIA. In: Gong, G., Gupta, K.C. (eds.), Progress in Cryptology – INDOCRYPT ’10, vol. 6498, Lecture Notes in Computer Science, pp. 197–209. Springer, Heidelberg (2010)
Tsunoo, Y., Tsujihara, E., Shigeri, M., Saito, T., Suzaki, T., Kubo, H.: Impossible differential cryptanalysis of CLEFIA. In: Nyberg, K. (ed.), Fast Software Encryption – FSE ’08, vol. 5086, Lecture Notes in Computer Science, pp. 398–411. Springer, Heidelberg (2008)
Wagner, D.: The boomerang attack. In: Knudsen, L. (ed.) Fast Software Encryption – FSE ’99, vol. 1636, Lecture Notes in Computer Science, pp. 156–170 Springer, Heidelberg (1999)
Wang, Q., Liu, Z., Varıcı, K., Sasaki, Y., Rijmen, V., Todo, Y.: Cryptanalysis of reduced-round SIMON32 and SIMON48. In: Meier, W., Mukhopadhyay, D. (eds.), Progress in Cryptology – INDOCRYPT 2014, vol. 8885, Lecture Notes in Computer Science, pp. 143–160. Springer, Heidelberg (2014)
Wang, M., Wang, X., Hu, C.: New linear crypanalytic results of reduced-round of CAST-128 and CAST-256. In: Avanzi, R., Keliher, L., Sica, F. (eds.), Selected Areas in Cryptography – SAC ’08, vol. 5381, Lecture Notes in Computer Science, pp. 429–441 Springer, Heidelberg (2009)
Wen, L., Wang, M., Bogdanov, A., Chen, H.: General application of FFT in cryptanalysis and improved attacks on CAST-256. In: Meier, W., Mukhopadhyay, D. (eds.), Progress in Cryptology – INDOCRYPT ’14, vol. 8885, Lecture Notes in Computer Science, pp. 161–176. Springer, Heidelberg (2014)
Yi, W., Chen, S.: Improved Integral and Zero-correlation Linear Cyptanalysis of Reduced-round CLEFIA Block Cipher, in Cryptology ePrint Archive: Report 2016/149
Zhao, J.Y., Wang, M.Q., Wen, L.: Improved linear cryptanalysis of CAST-256. J. Comput. Sci. Technol. 29 (16), 1134–1139 (2014)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Nachef, V., Patarin, J., Volte, E. (2017). GOST, SIMON, BEAR-LION, CAST-256, CLEFIA. In: Feistel Ciphers. Springer, Cham. https://doi.org/10.1007/978-3-319-49530-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-319-49530-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49528-6
Online ISBN: 978-3-319-49530-9
eBook Packages: Computer ScienceComputer Science (R0)