Оценка показателя 2-транзитивности обобщённых алгоритмов шифрования Фейстеля
Several generalizations of the Feistel scheme are known. In this paper, we introducea mathematical model including different generalizations of the Feistel scheme. Forthe described и-generalized Feistel ciphers, we get an accessible lower boundary for thenumber of rounds under which the 2-transitivity is achieved.
Скачать электронную версию публикации
Загружен, раз: 211
Ключевые слова
Авторы
ФИО | Организация | Дополнительно | |
Пудовкина Марина Александровна | Московский инженерно-физический институт | кандидат физико-математических наук, доцент | maricap@rambler.ru |
Ссылки
Sung J., Lee S., Lim J. et al. Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis / / ASIACRYPT'2000, LNCS. 2000. V. 1976. P. 274-288.
Feistel H., Notz W. Some cryptographic techniques for machine-to-machine data communications / / Proc. IEEE. 1975. V. 63. No. 11. P. 1545-1554.
Schnorr C. P. On the construction of random number generators and random function generators / / Advances in Cryptology. Proc. Eurocrypt-88, LNCS. 1988. V. 330. P. 225-232.
Zheng Y., Matsumoto T., Imai I. On the construction of block ciphers provably secure and not relying on any unproved hypotheses / / Crypto-89, LNCS. 1989.
Moriai S., Vaudenay S. On the pseudorandomness of top-level schemes of block ciphers / / ASIACRYPT'2000, LNCS. 2000. V. 1976. P. 289-302.
Schneier B., Kelsey J. Unbalanced feistel networks and block cipher design / / FSE, 3rd International Workshop. Springer Verlag, 1996. P. 121-144.
