A New Method for Known Plaintext Attack of FEAL Cipher

@inproceedings{Matsui1992ANM,
  title={A New Method for Known Plaintext Attack of FEAL Cipher},
  author={Mitsuru Matsui and Atsuhiro Yamagishi},
  booktitle={EUROCRYPT},
  year={1992}
}
We propose a new known plaintext attack of FEAL cipher. Our method differs from previous statistical ones in point of deriving the extended key in definite way. As a result, it is possible to break FEAL-4 with 5 known plaintexts and FEAL-6 with 100 known plaintexts respectively. Moreover, we show a method to break FEAL-8 with 215 known plaintexts faster than an exhaustive search. 
Linear Cryptanalysis Method for DES Cipher
TLDR
A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations. Expand
A new fast and secure cryptosystem
TLDR
It is shown that there is strong evidence for the security of the cryptosystem, and the cipher makes use of truly random bits, so it gets a probabilistic scheme, which is not suspicious to methods like diierential or linear crypt-analysis. Expand
Cryptanalysis of Block Ciphers and Hash Functions
This paper presents a known and a chosen plaintext attack on the DES both of success rate 80% using 2 texts. The attacks improve on earlier results in that the total complexity is reduced by a factorExpand
Linear Cryptanalysis Using Multiple Approximations
TLDR
A technique is presented which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack, and it is illustrated that it is generally applicable and might be exceptionally successful when applied to other block ciphers. Expand
Linear Cryptanalysis Using Multiple Approximat ions
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data re- quired for a successful attack. We note the limits of thisExpand
Linear Cryptoanalysis of the Simplified AES Cipher Modified by Chaotic Sequences
TLDR
New symmetric key architectures based on a randomized version of the Simplified Advanced Encryption Standard (SAES) employing chaotic sequences are introduced and the improvement of the proposed technique against linear cryptanalysis as compared to the original AES algorithm is evaluated. Expand
Cryptanalysis and Improvements of the Quasigroup Block Cipher
This article presents results on the cryptanalysis of a quasigroup block cipher, which was previously proposed. The quasigroup block cipher provides an attractive encryption system for resourceExpand
A Linear Analysis of Blowfish and Khufu
TLDR
The first known-plaintext (and ciphertext-only) attacks on these ciphers are reported, and the fraction of user keys that generate weak nonlinear components is estimated, with large enough bias. Expand
Linear Cryptanalysis of the Fast Data Encipherment Algorithm
TLDR
It has been confirmed that the entire subkeys used in FEAL-8 can be derived with 225 pairs of known plaintexts and ciphertexts with a success rate approximately 70% spending about 1 hour using a WS. Expand
Cryptanalysis of the Quasigroup Block Cipher
TLDR
Preliminary results on the cryptanalysis of a quasigroup block cipher are presented and configurations of the QGBC are recommended to counter these problems. Expand
...
1
2
3
4
5
...

References

SHOWING 1-5 OF 5 REFERENCES
A Known Plaintext Attack of FEAL-4 and FEAL-6
TLDR
Known plaintext attacks of FEAL-4 andFEAL-6 are described, which require about 1000 and 20000 plaintext blocks respectively and are based on correlations with linear functions and an improved attack on FEAL -4 is found, which requires only 200 knwon plain text blocks. Expand
Differential Cryptanalysis of Feal and N-Hash
TLDR
The applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function is shown. Expand
Fast Data Encipherment Algorithm FEAL
TLDR
The FEAL (Fast data Encipherment ALgorihtm) fills the need for an encipherment algorithm that has safety equal to DES and is suitable for software as well as hardware implementation. Expand
Expansion of FEAL cipher,
  • NTT Review V01.2
  • 1990
Shnmir
  • “Differential Cryptandysis of FEAL and NHash,” Extended Abstract, Proceedings 01 EUROCRYP T ’91,
  • 1931