Cryptology ePrint Archive: Report 2014/786

On the Indifferentiability of Key-Alternating Feistel Ciphers with No Key Derivation

Chun Guo and Dongdai Lin

Abstract: Feistel constructions have been shown to be indifferentiable from random permutations at STOC 2011. Whereas how to properly mix the keys into an un-keyed Feistel construction without appealing to domain separation technique to obtain a block cipher which is provably secure against known-key and chosen-key attacks (or to obtain an ideal cipher) remains an open problem. We study this, particularly the basic structure of NSA's SIMON family of block ciphers. SIMON family takes a construction which has the subkey xored into a halve of the state at each round. More clearly, at the $i$-th round, the state is updated according to $$(x_i,x_{i-1})\mapsto(x_{i-1}\oplus F_i(x_i)\oplus k_i,x_i)$$ For such key-alternating Feistel ciphers, we show that 21 rounds are sufficient to achieve indifferentiability from ideal ciphers with $2n$-bit blocks and $n$-bit keys, assuming the $n$-to-$n$-bit round functions $F_1,\ldots,F_{21}$ to be random and public and an identical user-provided $n$-bit key to be applied at each round. This gives an answer to the question mentioned before, which is the first to our knowledge.

Category / Keywords: block cipher, ideal cipher, indifferentiability, key-alternating cipher, Feistel cipher.

Original Publication (with minor differences): IACR-TCC-2015

Date: received 3 Oct 2014, last revised 7 May 2015

Contact author: guochun at iie ac cn

Available format(s): PDF | BibTeX Citation

Note: Change the references. Also revise an error due to presentation.

Version: 20150507:080221 (All versions of this report)

Short URL: ia.cr/2014/786

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]