New insights on impossible differential cryptanalysis

Charles Bouillaguet, Orr Dunkelman, Pierre Alain Fouque, Gaëtan Leurent

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Since its introduction, impossible differential cryptanalysis has been applied to many ciphers. Besides the specific application of the technique in various instances, there are some very basic results which apply to generic structures of ciphers, e.g., the well known 5-round impossible differential of Feistel ciphers with bijective round functions. In this paper we present a new approach for the construction and the usage of impossible differentials for Generalized Feistel structures. The results allow to extend some of the previous impossible differentials by one round (or more), answer an open problem about the ability to perform this kind of analysis, and tackle, for the first time the case of non-bijective round functions.

Original languageEnglish
Title of host publicationSelected Areas in Cryptography - 18th International Workshop, SAC 2011, Revised Selected Papers
Pages243-259
Number of pages17
DOIs
StatePublished - 2012
Event18th International Conference on Selected Areas in Cryptography, SAC 2011 - Toronto, ON, Canada
Duration: 11 Aug 201112 Aug 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7118 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Selected Areas in Cryptography, SAC 2011
Country/TerritoryCanada
CityToronto, ON
Period11/08/1112/08/11

Keywords

  • Generalized Feistel
  • Impossible differential cryptanalysis
  • Matrix method
  • Miss in the middle

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'New insights on impossible differential cryptanalysis'. Together they form a unique fingerprint.

Cite this