International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Reflection Attacks on Product Ciphers

Authors:
Orhun Kara
Download:
URL: http://eprint.iacr.org/2007/043
Search ePrint
Search Google
Abstract: In this paper we describe a novel attack method on product ciphers, the {\em reflection attack}. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting and exceptional properties of the attack are also presented in these examples. In addition, we discuss new design criteria that make product ciphers resistant to self similarity attacks and introduce a definition of similarity degree.
BibTeX
@misc{eprint-2007-13325,
  title={Reflection Attacks on Product Ciphers},
  booktitle={IACR Eprint archive},
  keywords={Block Cipher, Round Function, Round Key, Key Schedule, Cryptanalysis, Self Similarity},
  url={http://eprint.iacr.org/2007/043},
  note={ orhun@uekae.tubitak.gov.tr 13569 received 12 Feb 2007, last revised 25 Feb 2007},
  author={Orhun Kara},
  year=2007
}