Cryptology ePrint Archive: Report 2007/043
Reflection Attacks on Product Ciphers
Orhun Kara
Abstract: In this paper we describe a novel attack method on product ciphers, the {\em reflection attack}. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting and exceptional properties of the attack are also presented in these examples. In addition, we discuss new design criteria that make product ciphers resistant to self similarity attacks and introduce a definition of similarity degree.
Category / Keywords: Block Cipher, Round Function, Round Key, Key Schedule, Cryptanalysis, Self Similarity
Date: received 12 Feb 2007, last revised 25 Feb 2007
Contact author: orhun at uekae tubitak gov tr
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Note: thanks
Version: 20070225:234529 (All versions of this report)
Short URL: ia.cr/2007/043
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]