Cryptology ePrint Archive: Report 2007/043

Reflection Attacks on Product Ciphers

Orhun Kara

Abstract: In this paper we describe a novel attack method on product ciphers, the {\em reflection attack}. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting and exceptional properties of the attack are also presented in these examples. In addition, we discuss new design criteria that make product ciphers resistant to self similarity attacks and introduce a definition of similarity degree.

Category / Keywords: Block Cipher, Round Function, Round Key, Key Schedule, Cryptanalysis, Self Similarity

Date: received 12 Feb 2007, last revised 25 Feb 2007

Contact author: orhun at uekae tubitak gov tr

Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation

Note: thanks

Version: 20070225:234529 (All versions of this report)

Short URL:

[ Cryptology ePrint archive ]