𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Feistel Ciphers: Security Proofs and Cryptanalysis

✍ Scribed by Valerie Nachef, Jacques Patarin, Emmanuel Volte (auth.)


Publisher
Springer International Publishing
Year
2017
Tongue
English
Leaves
310
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order to obtain pseudorandom permutations and secret-key block ciphers. In Part 1, we describe Feistel ciphers and their variants. We also give a brief story of these ciphers and basic security results. In Part 2, we describe generic attacks on Feistel ciphers. In Part 3, we give results on DES and specific Feistel ciphers. Part 4 is devoted to improved security results. We also give results on indifferentiability and indistinguishability.

✦ Table of Contents


Front Matter....Pages i-xv
Front Matter....Pages 1-1
Introduction: General Definitions....Pages 3-9
Balanced Feistel Ciphers, First Properties....Pages 11-19
The H-Coefficient Method....Pages 21-43
Luby-Rackoff Theorems....Pages 45-53
Front Matter....Pages 55-55
Introduction to Cryptanalysis and Generic Attacks....Pages 57-64
Generic Attacks on Classical Feistel Ciphers....Pages 65-73
Generic Attacks on Classical Feistel Ciphers with Internal Permutations....Pages 75-94
Generic Attacks on Contracting Feistel Ciphers....Pages 95-116
Generic Attacks on Expanding Feistel Ciphers....Pages 117-138
Generic Attacks on Generalized Feistel Ciphers....Pages 139-153
Front Matter....Pages 155-155
DES and Variants: 3DES, DES – X ....Pages 157-176
GOST, SIMON, BEAR-LION, CAST-256, CLEFIA....Pages 177-190
Front Matter....Pages 191-191
Proof Beyond the Birthday Bound with the Coupling Technique....Pages 193-201
Introduction to Mirror Theory....Pages 203-221
β€œP i βŠ• P j Theorem” When ΞΎ max = 2....Pages 223-256
β€œP i βŠ• P j Theorem” on Standard Systems and β€œP i βŠ• P j Theorem” with Any ΞΎ max ....Pages 257-270
Proofs Beyond the Birthday Bound on Ξ¨ k with the H-Coefficient Method....Pages 271-289
Indifferentiability....Pages 291-296
Back Matter....Pages 297-309

✦ Subjects


Data Encryption;Probability and Statistics in Computer Science;Mathematical Applications in Computer Science


πŸ“œ SIMILAR VOLUMES


Cryptanalysis of Number Theoretic Cipher
✍ Samuel S. Wagstaff, Jr. (Author) πŸ“‚ Library πŸ“… 2002 πŸ› Chapman and Hall/CRC

<p>At the heart of modern cryptographic algorithms lies computational number theory. Whether you`re encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers tak

Cryptanalysis: a Study of Ciphers and Th
✍ Gaines, Helen F πŸ“‚ Library πŸ“… 2014;2013 πŸ› Dover Publications 🌐 English

Cover; Title; Copyright; Dedication; PREFACE; Contents; I. GENERAL INFORMATION; II. CONCEALMENT DEVICES; III. TRANSPOSITION TYPES; IV. GEOMETRICAL TYPES- THE NIHILIST TRANSPOSITION; V. GEOMETRICAL TYPES- THE TURNING GRILLE; VI. IRREGULAR TYPES- COLUMNAR TRANSPOSITION .; VII. GENERAL METHODS- MULTIPL

Cryptanalysis: A Study of Ciphers and Th
✍ Gaines, Helen F πŸ“‚ Library πŸ“… 2014 πŸ› Dover Publications 🌐 English

Cover; Title; Copyright; Dedication; PREFACE; Contents; I. GENERAL INFORMATION; II. CONCEALMENT DEVICES; III. TRANSPOSITION TYPES; IV. GEOMETRICAL TYPES- THE NIHILIST TRANSPOSITION; V. GEOMETRICAL TYPES- THE TURNING GRILLE; VI. IRREGULAR TYPES- COLUMNAR TRANSPOSITION .; VII. GENERAL METHODS- MULTIPL

Advanced Linear Cryptanalysis of Block a
✍ P Junod, A. Canteaut πŸ“‚ Library πŸ“… 2011 πŸ› IOS Press 🌐 English

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but als