Advertisement

Ciphertext Only Attack for One-way function of the MAP using One Ciphertext

  • Yukiyasu Tsunoo
  • Eiji Okamoto
  • Tomohiko Uyematsu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 839)

Abstract

FEAL-N proposed by NTT is an N-round block cipher which is well suited for a fast software execution. We research the method which improves FEAL algorithm against cryptanalysis based on the careful analysis of data randomizer. Since the round function f used as data randomizer has an inverse function f−1, we have already shown that there exists a key-independent relation between plaintext and ciphertext.

In this paper, we apply our attack to the ciphertext only attack for one-way function of the MAP using only one ciphertext. Computer implementation of the proposed attack shows that the improvement of the computational complexity to obtain the plaintext is decreased and given by O(232).

5 References

  1. [1]
    Miyaguchi, S.: “CRITERIA FOR THE STRENGTH OF ENCIPHERMENT AND STANDARDIZATION FOR CRYPTOGRAPHIC TECHNIQUES”, Proc. of the 1986 Symposium on Cryptography and Information Security, (1986).Google Scholar
  2. [2]
    Shimizu, A., Miyaguchi, S.: “Fast Data Encipherment Algorithm FEAL”, Advances in Cryptology-EUROCRYPT’87, p267–278 (1987).Google Scholar
  3. [3]
    E. Biham, A. Shamir: “Differential Cryptanalysis of Feal and N-Hash”, Advances in Cryptology-EUROCRYPT’91, p1–16 (1991).Google Scholar
  4. [4]
    H. Gilbert, G. Chasse: “A STATISTICAL ATTACK OF THE FEAL-8 CRYPTOSYSTEM”, Advances in Cryptology-CRYPTO’90, p22–33 (1990).Google Scholar
  5. [5]
    A. TARDY-CORFDIR, H. GILBERT: “A KNOWN PLAINTEXT ATTACK OF FEAL-4 AND FEAL-6”, Advances in Cryptology-CRYPTO’91, p172–182 (1991).Google Scholar
  6. [6]
    Kaneko, T.: “A known plaintext cryptanalytic attack on FEAL-4”, IEICE Tech. Report, ISEC91-25 (1991) (in Japanese).Google Scholar
  7. [7]
    Matsui, M., Yamagishi, A.: “A Study on Known Text Attack of Involution-Type Cryptosystems”, IEICE Tech. Report, ISEC91-26 (1991) (in Japanese).Google Scholar
  8. [8]
    Tsujii, S., Kasahara, M.: “Cryptography and Information Security” Shoh-Kohdo (1990) (in Japanese).Google Scholar
  9. [9]
    Matsui, K.: “Introduction of Cryptoanalysis” Morikita Publishing Co. (1990) (in Japanese).Google Scholar
  10. [10]
    Tsunoo, Y., Okamoto, E., Doi, H.: “Analytical Known Plain-text Attack for FEAL-4 and Its Improvement”, Proc. of the 1993 Symposium on Cryptography and Information Security, SCIS93-3A (1993) (in Japanese).Google Scholar
  11. [11]
    Okamoto, E.: “An Introduction to Theory of Cryptology” Kyoritsu Publishing Co. (1993) (in Japanese).Google Scholar
  12. [12]
    Kazuo, N.: “Cycling closure test of FEAL” IEICE Tech. Report, ISEC90-50 (1990) (in Japanese).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1994

Authors and Affiliations

  • Yukiyasu Tsunoo
    • 1
  • Eiji Okamoto
    • 1
  • Tomohiko Uyematsu
    • 1
  1. 1.School of Information ScienceJapan Advanced Institute of Science and TechnologyJapan

Personalised recommendations