International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security

Authors:
Chun Guo
Lei Wang
Download:
DOI: 10.1007/978-3-030-03326-2_8
Search ePrint
Search Google
Presentation: Slides
Conference: ASIACRYPT 2018
Abstract: Key-Alternating Feistel (KAF) ciphers, a.k.a. Feistel-2 models, refer to Feistel networks with round functions of the form $$F_i(k_i\oplus x_i)$$, where $$k_i$$ is the (secret) round-key and $$F_i$$ is a public random function. This model roughly captures the structures of many famous Feistel ciphers, and the most prominent instance is DES.Existing provable security results on KAF assumed independent round-keys and round functions (ASIACRYPT 2004 & FSE 2014). In this paper, we investigate how to achieve security under simpler and more realistic assumptions: with round-keys derived from a short main-key, and hopefully with identical round functions.For birthday-type security, we consider 4-round KAF, investigate the minimal conditions on the way to derive the four round-keys, and prove that when such adequately derived keys and the same round function are used, the 4-round KAF is secure up to $$2^{n/2}$$ queries.For beyond-birthday security, we focus on 6-round KAF. We prove that when the adjacent round-keys are independent, and independent round-functions are used, the 6 round KAF is secure up to $$2^{2n/3}$$ queries. To our knowledge, this is the first beyond-birthday security result for KAF without assuming completely independent round-keys.Our results hold in the multi-user setting as well, constituting the first non-trivial multi-user provable security results on Feistel ciphers. We finally demonstrate applications of our results on designing key-schedules and instantiating keyed sponge constructions.
BibTeX
@inproceedings{asiacrypt-2018-29143,
  title={Revisiting Key-Alternating Feistel Ciphers for Shorter Keys and Multi-user Security},
  booktitle={Advances in Cryptology – ASIACRYPT 2018},
  series={Lecture Notes in Computer Science},
  publisher={Springer},
  volume={11272},
  pages={213-243},
  doi={10.1007/978-3-030-03326-2_8},
  author={Chun Guo and Lei Wang},
  year=2018
}