Paper 2007/043

Reflection Attacks on Product Ciphers

Orhun Kara

Abstract

In this paper we describe a novel attack method on product ciphers, the {\em reflection attack}. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting and exceptional properties of the attack are also presented in these examples. In addition, we discuss new design criteria that make product ciphers resistant to self similarity attacks and introduce a definition of similarity degree.

Note: thanks

Metadata
Available format(s)
PDF PS
Publication info
Published elsewhere. Unknown where it was published
Keywords
Block CipherRound FunctionRound KeyKey ScheduleCryptanalysisSelf Similarity
Contact author(s)
orhun @ uekae tubitak gov tr
History
2007-02-25: revised
2007-02-14: received
See all versions
Short URL
https://ia.cr/2007/043
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/043,
      author = {Orhun Kara},
      title = {Reflection Attacks on Product Ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2007/043},
      year = {2007},
      note = {\url{https://eprint.iacr.org/2007/043}},
      url = {https://eprint.iacr.org/2007/043}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.