Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of the Graduate School of the Chinese Academy of Science》 2003-01
Add to Favorite Get Latest Update

Linear Cryptanalysis for a Class of Generalized Feistel Ciphers

ZHANG Ru Wen (State Key Laboratory of Information Security, the Graduate School of Chinese Academy of Sciences, Beijing 100039, China )  
Proposes a method for seeking the upper bounds of maximum linear bias for these ciphers. This technique consists of two steps. Firstly, we give the mathematical relationship between linear bias of ciphers and linear bias of round function F and S box respectively by carrying out strictly mathematical expression of linear bias for ciphers. Next we determine the upper bounds of linear bias for ciphers. Using this method we give the upper bounds of linear bias within 32 rounds.
【Fund】: 973项目(G19990 3 5 80 8);; 863项目(2 0 0 1AA14 0 10 1)资助
【CateGory Index】: TN918.1
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 5 Hits
1 YU Zhao-ping,WANG Nian-ping (Institute of Electronic Technology,The PLA Information Engineering University,Zhengzhou,Henan 450004,China);Linear Deviation Analysis of the Unbalanced Feistel Networks[J];Acta Electronica Sinica;2006-07
2 LI Chao~1,2,3,QU Long-jiang~1,LI Qiang~1 (1. College of Science, National Univ. of Defense Technology, Changsha 410073,China;2. College of Computer, National Univ. of of Southeast Univ., Nanjing 210018,China);A New Linear Cryptanalysis of DES Cipher[J];Journal of National University of Defense Technology;2004-03
3 WANG Jian-kang;WANG Nian-ping;Institute of Crytography Engineering,the PLA Information Engineering University;;Further Security Evaluation for a Class of Generalized Feistel Ciphers[J];Acta Electronica Sinica;2013-10
4 CHAI Li,JIA Xue-dong,KANG Fei(Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China);Practical Security Research for Block Ciphers with Feistel Networks[J];Journal of Information Engineering University;2008-04
5 Xiaopei GUO·Kejian XU·Tongsen SUN College of Mathematics,Qingdao University,Qingdao 266071,China. Xiubin FAN Institute of Software,Chinese Academy of Sciences,Beijing 100049,China.;ANALYSIS OF MINIMUM NUMBERS OF LINEARLY ACTIVE S-BOXES OF A CLASS OF GENERALIZED FEISTEL BLOCK CIPHERS[J];系统科学与复杂性学报(英文版);2012-05
【Citations】
Chinese Journal Full-text Database 1 Hits
1 Wu Wenling He Yeping(State Key Lab of Info. Security, Institute of Software, CAS, Beijing 100080, China) (Eng. Research Center for Info. Security Technology, CAS, Beijing 100080, China);SECURITY EVALUATION FOR A CLASS OF GENERALIZED FEISTEL CIPHERS[J];Journal of Electronics and Information Technology;2002-09
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 WANG Nian-ping(Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou,450004 China);Security analysis for a class of generalized Feistel ciphers[J];Journal of Dalian Maritime University;2007-03
2 Wang Nian-ping Jin Chen-hui Li Yun-qiang (Institute of Electron. Tech., The PLA Info. Eng. Univ., Zhengzhou 450004, China);The Differential Provable Security Analysis of a Kind of Unbalanced Feistel Networks[J];Journal of Electronics and Information Technology;2005-06
3 TANG Guo-ping~(1,2),LIAO Xiao-feng~(1)(1.College of Computer Science,Chongqing University,Chongqing 400030,China;2.Chongqing Jiangbei Municipal Bureau of Culture Radio Television Press & Publication,Chongqing 400020,China);Feistel-based Chaotic Cryptographic Algorithm[J];Journal of Chongqing University(Natural Science Edition);2005-10
4 LI Chao~1,2,3,QU Long-jiang~1,LI Qiang~1 (1. College of Science, National Univ. of Defense Technology, Changsha 410073,China;2. College of Computer, National Univ. of of Southeast Univ., Nanjing 210018,China);A New Linear Cryptanalysis of DES Cipher[J];Journal of National University of Defense Technology;2004-03
5 WANG Jian-kang;WANG Nian-ping;Institute of Crytography Engineering,the PLA Information Engineering University;;Further Security Evaluation for a Class of Generalized Feistel Ciphers[J];Acta Electronica Sinica;2013-10
6 WANG Nian-ping Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou 450004,China;Analysis on security of a class of unbalanced Feistel ciphers[J];Computer Engineering and Applications;2010-36
7 WANG Nianping,WU Shiwen Institute of Electronic Technology,PLA Information Engineering University,Zhengzhou 450004,China;Researches on security of class of block ciphers[J];Computer Engineering and Applications;2011-17
8 CUI Jie,ZHONG Hong(School of Computer Science and Technology,Anhui University,Hefei 230039,China);Decimal System Encryption Algorithm Based on Feistel Network[J];Computer Engineering;2012-03
9 ZHANG Bin 1,2 & JIN ChenHui 2 1 P.O.Box 1936,Beijing 100193,China;2 Electronic Technology Institute,Information Engineering University,Zhengzhou 450004,China;Practical security against linear cryptanalysis for SMS4-like ciphers with SP round function[J];中国科学:信息科学(英文版);2012-09
10 WANG Nian-Ping;YIN Qing;PLA Information Engineering University;;Security Evaluation for SMS4-typed Ciphers Structure Against Differential and Linear Cryptanalysis[J];Journal of Cryptologic Research;2015-02
【Co-references】
Chinese Journal Full-text Database 10 Hits
1 Guo Baoan;Cai Changnian(Department of Telecommunication Engineering,Beijing University of Posts and Telecommunications, Beijing 100088);The Irreducible Polynomials over Finite Fields[J];JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS;1994-01
2 JIE Jinliang, SONG Yucheng, WANG Yan(College of Information Engineering, Chengdu University of Technology, China);THE RESEARCH AND REALIZATION OF CRYPTOGRAPHY PERMUTATION ALGORITHM[J];Journal of Chengdu University of Technology(Science & Technology Edition);2003-05
3 WANG Nian-ping(Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou,450004 China);Security analysis for a class of generalized Feistel ciphers[J];Journal of Dalian Maritime University;2007-03
4 Guo Chunxia,Qiu Xuehong (School of Computer Science and Technology, Xidian University, Xi'an 710071, China);Research on and Design of Embedded System Security[J];It Age;2005-08
5 Xing Yusen; Lin Xiaodong;Yang Yixian(Department of Information Engineering,Beijing University of Posts and Telecommunications,Beijing 100088);The Differential Characteristics of the Substitution-Permutation Networks[J];Acta Electronica Sinica;1997-10
6 Gu Dawu;Xiao Guozhen(Research Institute of Information Security,Xidian University,Xi'an 710071);Some Cryptographic Properties of Exponential Functions[J];ACTA ELECTRONICA SINICA;1998-01
7 HU Yu pu,CAI Mian,XIAO Guo Zhen (Information Security Institute,ISN National Key Lab.,Xidian University,Xi'an 710071,China);A Class of High Order Differential Cryptanalysis[J];ACTA ELECTRONICA SINICA;1999-10
8 FENG Guo-zhu 1,LI Chao 1,2 ,DUO Lei 1,XIE Duan-qiang 1,DAI Qing-ping 1 ( 1.Dept of Mathematic and System Science,NUDT,Changsha,Hunan 410073,China; 2.Laboratory of Computer Science,Institute of Software,CAS,Beijing 100080,China);Transmutative Rijndael with the Differential and Statistical Charactartics[J];Acta Electronica Sinica;2002-10
9 WU Wen-ling,MA Heng-tai,TANG Liu-ying,QING Si-han (1.Engineering Research Center for Information Security Technology,Chinese Academy of Sciences,Beijing 100080,China; 2.State Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100080,China);Nonlinear Cryptanalysis of 5-Round SAFER++[J];Acta Electronica Sinica;2003-07
10 XIAO Guo zhen 1,BAI En jian 1,LIU Xiao juan 2 (1.P.O.Box 119 Key Lab.on ISN,Xidian Univ.,Xi'an,Shaanxi 710071,China; 2.Department of Applied Mathematics of Xidian Univ.,Xi'an,Shaanxi 710071,China);Some New Developments on the Cryptanalysis of AES[J];Acta Electronica Sinica;2003-10
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 WANG Nian-ping,JIN Chen-hui,YU Zhao-ping(Institute of Electronic Technology,the PLA Information Engineering University,Zhengzhou,Henan 450004,China);Furthermore Analyses of Linear Provable Security for a Class of Unbalanced Feistel Networks[J];Acta Electronica Sinica;2006-10
2 WANG Jian-kang;WANG Nian-ping;Institute of Crytography Engineering,the PLA Information Engineering University;;Further Security Evaluation for a Class of Generalized Feistel Ciphers[J];Acta Electronica Sinica;2013-10
3 CUI Jie,ZHONG Hong(School of Computer Science and Technology,Anhui University,Hefei 230039,China);Decimal System Encryption Algorithm Based on Feistel Network[J];Computer Engineering;2012-03
4 LIU Wen-tao,SUN Wen-sheng(School of Information and Communication Engineering,BeijingUniversity of Posts and Telecommunications,Beijing 100876,China);Application of Fractal Theory in Cryptographic Algorithm[J];Journal of China Academy of Electronics and Information Technology;2008-06
5 Ha Li-yuan;Bai Feng-wei;Zhang Yan;Xilinguole Vocational College;;A Hash Function which Choose S-box Dynamically Based on Pre-image[J];Journal of Inner Mongolia University for Nationalities(Natural Sciences);2013-04
6 TENG Yun;Huaiyin Advanced Vocation & Trchnical School of Health;;Analysis of Computer Information Security and Encryption Technology[J];Agriculture Network Information;2013-11
7 WANG Nian-Ping;YIN Qing;PLA Information Engineering University;;Security Evaluation for SMS4-typed Ciphers Structure Against Differential and Linear Cryptanalysis[J];Journal of Cryptologic Research;2015-02
8 YAN Xiao-meng;GUO Xiao-pei;SUN Tong-sen;XU Ke-jian;College of Mathematics,Qingdao University;;The Linear Spread Loci of SMS4[J];Journal of Qingdao University(Natural Science Edition);2014-01
9 CHAI Li,JIA Xue-dong,KANG Fei(Institute of Information Engineering,Information Engineering University,Zhengzhou 450002,China);Practical Security Research for Block Ciphers with Feistel Networks[J];Journal of Information Engineering University;2008-04
10 ZHANG Jin-min;XIE Xiao-dong;University of Electronic Science and Technology of China;;An Encryption and Decryption Algorithm of Data Based on Memory[J];Microelectronics & Computer;2015-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved