Paper 2021/335
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
Ohad Amon, Orr Dunkelman, Nathan Keller, Eyal Ronen, and Adi Shamir
Abstract
Format-Preserving Encryption (FPE) schemes accept plaintexts from any finite set of values (such as social security numbers or birth dates) and produce ciphertexts that belong to the same set. They are extremely useful in practice since they make it possible to encrypt existing databases or communication packets without changing their format. Due to industry demand, NIST had standardized in 2016 two such encryption schemes called FF1 and FF3. They immediately attracted considerable cryptanalytic attention with decreasing attack complexities. The best currently known attack on the Feistel construction FF3 has data and memory complexity of
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published by the IACR in EUROCRYPT 2021
- Keywords
- cryptanalysisFormat-Preserving EncryptionFF3
- Contact author(s)
- eyal ronen @ cs tau ac il
- History
- 2021-03-17: received
- Short URL
- https://ia.cr/2021/335
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/335, author = {Ohad Amon and Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Three Third Generation Attacks on the Format Preserving Encryption Scheme {FF3}}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/335}, year = {2021}, url = {https://eprint.iacr.org/2021/335} }