Paper 2007/043
Reflection Attacks on Product Ciphers
Orhun Kara
Abstract
In this paper we describe a novel attack method on product ciphers, the {\em reflection attack}. The attack method exploits certain similarities among round functions which have not been utilized in previous self similarity attacks. We give practical examples illustrating the power of the reflection attack on several ciphers such as GOST, DEAL and some variants of DES and Magenta. Many interesting and exceptional properties of the attack are also presented in these examples. In addition, we discuss new design criteria that make product ciphers resistant to self similarity attacks and introduce a definition of similarity degree.
Note: thanks
Metadata
- Available format(s)
- PDF PS
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Block CipherRound FunctionRound KeyKey ScheduleCryptanalysisSelf Similarity
- Contact author(s)
- orhun @ uekae tubitak gov tr
- History
- 2007-02-25: revised
- 2007-02-14: received
- See all versions
- Short URL
- https://ia.cr/2007/043
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2007/043, author = {Orhun Kara}, title = {Reflection Attacks on Product Ciphers}, howpublished = {Cryptology {ePrint} Archive, Paper 2007/043}, year = {2007}, url = {https://eprint.iacr.org/2007/043} }