Difference between revisions of "Yu Sasaki"

From ESC2013
Jump to: navigation, search
(Created page with "'''Title:''' Meet-in-the-Middle Attacks on Feistel Functions: Impact of Omitting the Last Network Twist '''Abstract:''' Several block ciphers omit the the network twist in ...")
 
 
Line 13: Line 13:
 
can be a weakness against preimage attacks,
 
can be a weakness against preimage attacks,
 
when they are used to build a compression function with some PGV mode.
 
when they are used to build a compression function with some PGV mode.
 +
 +
'''Slides''' [[Media:Sasaki_ESC2013.pdf|PDF]]

Latest revision as of 10:40, 22 January 2013

Title:

Meet-in-the-Middle Attacks on Feistel Functions: Impact of Omitting the Last Network Twist

Abstract:

Several block ciphers omit the the network twist in the last round. This makes the encryption and decryption algorithms symmetric, and leads to some advantage for implementations, while it does not lower the provable security bound against the differential and linear cryptanalysis. In this talk, it is shown that the omission of the last network twist can be a weakness against preimage attacks, when they are used to build a compression function with some PGV mode.

Slides PDF