Avalanche Analysis of Extended Feistel Network
In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. In order to analyze the security of a cipher, it is also important to study the intrinsic security provided by these top-level structural models. Most research focuses in determinin...
Главные авторы: | , , |
---|---|
Формат: | Conference or Workshop Item |
Язык: | English |
Опубликовано: |
2005
|
Предметы: | |
Online-ссылка: | http://eprints.utm.my/3258/1/Subariah_PARS05.pdf |
_version_ | 1825909363033767936 |
---|---|
author | Ibrahim, Subariah Maarof, Mohd. Aizaini Idris, Norbik Bashah |
author_facet | Ibrahim, Subariah Maarof, Mohd. Aizaini Idris, Norbik Bashah |
author_sort | Ibrahim, Subariah |
collection | ePrints |
description | In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. In order to analyze the security of a cipher, it is also important to study the intrinsic security provided by these top-level structural models. Most research focuses in determining F functions that yield secure Feistel Networks (FN). This paper analyses the structural models of a generalized concept of FN known as Extended Feistel Network (EFN). EFN splits the input blocks into n > 2 sub-blocks. Like conventional FN, EFN consists of a series of rounds whereby at least one sub-block is subjected to an F-function. The work examines the models in terms of its avalanche criterion in order to determine the optimal scheme suitable for the design of a flexible block size cipher. The analysis shows that EFN Type-II is the most optimal structural model for this design. |
first_indexed | 2024-03-05T18:01:02Z |
format | Conference or Workshop Item |
id | utm.eprints-3258 |
institution | Universiti Teknologi Malaysia - ePrints |
language | English |
last_indexed | 2024-03-05T18:01:02Z |
publishDate | 2005 |
record_format | dspace |
spelling | utm.eprints-32582017-08-30T07:45:08Z http://eprints.utm.my/3258/ Avalanche Analysis of Extended Feistel Network Ibrahim, Subariah Maarof, Mohd. Aizaini Idris, Norbik Bashah QA75 Electronic computers. Computer science In general, block ciphers consist of one top-level structural model into which the round function F is plugged into. In order to analyze the security of a cipher, it is also important to study the intrinsic security provided by these top-level structural models. Most research focuses in determining F functions that yield secure Feistel Networks (FN). This paper analyses the structural models of a generalized concept of FN known as Extended Feistel Network (EFN). EFN splits the input blocks into n > 2 sub-blocks. Like conventional FN, EFN consists of a series of rounds whereby at least one sub-block is subjected to an F-function. The work examines the models in terms of its avalanche criterion in order to determine the optimal scheme suitable for the design of a flexible block size cipher. The analysis shows that EFN Type-II is the most optimal structural model for this design. 2005-05 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/3258/1/Subariah_PARS05.pdf Ibrahim, Subariah and Maarof, Mohd. Aizaini and Idris, Norbik Bashah (2005) Avalanche Analysis of Extended Feistel Network. In: Postgraduate Annual research Seminar, May 17-18, 2005, FSKSM, UTM. |
spellingShingle | QA75 Electronic computers. Computer science Ibrahim, Subariah Maarof, Mohd. Aizaini Idris, Norbik Bashah Avalanche Analysis of Extended Feistel Network |
title | Avalanche Analysis of Extended Feistel Network |
title_full | Avalanche Analysis of Extended Feistel Network |
title_fullStr | Avalanche Analysis of Extended Feistel Network |
title_full_unstemmed | Avalanche Analysis of Extended Feistel Network |
title_short | Avalanche Analysis of Extended Feistel Network |
title_sort | avalanche analysis of extended feistel network |
topic | QA75 Electronic computers. Computer science |
url | http://eprints.utm.my/3258/1/Subariah_PARS05.pdf |
work_keys_str_mv | AT ibrahimsubariah avalancheanalysisofextendedfeistelnetwork AT maarofmohdaizaini avalancheanalysisofextendedfeistelnetwork AT idrisnorbikbashah avalancheanalysisofextendedfeistelnetwork |