Broken block ciphers | Feistel ciphers

FEAL

In cryptography, FEAL (the Fast data Encipherment ALgorithm) is a block cipher proposed as an alternative to the Data Encryption Standard (DES), and designed to be much faster in software. The Feistel based algorithm was first published in 1987 by and from NTT. The cipher is susceptible to various forms of cryptanalysis, and has acted as a catalyst in the discovery of differential and linear cryptanalysis. There have been several different revisions of FEAL, though all are Feistel ciphers, and make use of the same basic round function and operate on a 64-bit block. One of the earliest designs is now termed FEAL-4, which has four rounds and a 64-bit key. Problems were found with FEAL-4 from the start: Bert den Boer related a weakness in an unpublished rump session at the same conference where the cipher was first presented. A later paper (den Boer, 1988) describes an attack requiring 100–10000 chosen plaintexts, and Sean Murphy (1990) found an improvement that needs only 20 chosen plaintexts. Murphy and den Boer's methods contain elements similar to those used in differential cryptanalysis. The designers countered by doubling the number of rounds, FEAL-8 (Shimizu and Miyaguchi, 1988). However, eight rounds also proved to be insufficient — in 1989, at the Securicom conference, Eli Biham and Adi Shamir described a differential attack on the cipher, mentioned in (Miyaguchi, 1989). Gilbert and Chassé (1990) subsequently published a statistical attack similar to differential cryptanalysis which requires 10000 pairs of chosen plaintexts. In response, the designers introduced a variable-round cipher, FEAL-N (Miyaguchi, 1990), where "N" was chosen by the user, together with FEAL-NX, which had a larger 128-bit key. Biham and Shamir's differential cryptanalysis (1991) showed that both FEAL-N and FEAL-NX could be broken faster than exhaustive search for N ≤ 31. Later attacks, precursors to linear cryptanalysis, could break versions under the known plaintext assumption, first (Tardy-Corfdir and Gilbert, 1991) and then (Matsui and Yamagishi, 1992), the latter breaking FEAL-4 with 5 known plaintexts, FEAL-6 with 100, and FEAL-8 with 215. In 1994, Ohta and Aoki presented a linear cryptanalytic attack against FEAL-8 that required 212 known plaintexts. (Wikipedia).

FEAL
Video thumbnail

Why is feminazi insulting?

Cristen breaks down the origin of feminazi and why it's more of an insult to the people who call people feminazis than the actual, supposed feminazis. Share this on Facebook: http://on.fb.me/1JMvhib Share this on Twitter: http://ctt.ec/C2EVf Subscribe: http://bit.ly/1l8JXv3 On the web:

From playlist Media Stuff

Video thumbnail

The Importance of Atonement

The idea of ‘atonement’ sounds very old-fashioned and is deeply rooted in religious tradition. To atone means, in essence, to acknowledge one’s capacity for wrongness and one’s readiness for apology and desire for change. It’s a concept that every society needs at its center. For gifts and

From playlist RELATIONSHIPS

Video thumbnail

Vodafone-Happy to Help Ad (full)

In some very special way I still remain loyal to this brand,yet another spectaculary meaningful ad from O&M..gd going

From playlist Advertisements

Video thumbnail

When women nag.. I just hope I can do the same!

When women nag.. I just hope I can do the same!

From playlist Humor

Video thumbnail

Can Virtual Reality Really Save the Planet? with Jeremy Bailenson

What is the best use of virtual reality? Professor Jeremy Bailenson explains how virtual reality can be used to affect positive change, most notably for the environment. Jeremy Bailenson is the founding director of the Virtual Human Interaction Lab, a professor of communication and a se

From playlist STANFORD+CONNECTS

Video thumbnail

Join my wife and me on the 1st day of our Diwali

Join my wife and me on the 1st day of our Diwali

From playlist India

Video thumbnail

How to Get Married

Getting married is a hugely significant and solemn step: for centuries, we did it under the guidance of religion, but nowadays, for many of us, faith no longer convinces. At the same time, we want to mark marriage with some kind of ritual and appropriate grandeur. That's why the School of

From playlist RELATIONSHIPS

Video thumbnail

What Are Breasts Really For?

Check us out on iTunes! http://dne.ws/1NixUds Please Subscribe! http://testu.be/1FjtHn5 Breasts are for feeding our young but there's another persistent theory that breasts play a larger role in attracting a male counterpart. + + + + + + + + Previous Series: The Birth And De

From playlist Breasts: What They Do, Why We Have Them, And How They Can Change Your Life

Video thumbnail

Faith and Human Rights

The language of human rights has become the universal moral discourse in our globalized era. Explore how faiths support and motivate respect for these rights or critique and oppose the validity of human rights.

From playlist Faith and Globalization

Video thumbnail

Bastiaan is verbaasd door Trip-E | Drugslab

In deze video probeert Bastiaan Rosman Trip-E (Happy Caps) uit om te zien welk effect het heeft op zijn lichaam. Trip-E is de meest psychedelische van alle happy caps. Bastiaan is verbaasd door de effecten. NIEUWSGIERIG NAAR EEN DRUG? Laat ons weten in de comment sectie naar welke drug je

From playlist Drug Tests

Video thumbnail

What is a Hashtag?

In this video, you’ll learn more about how hashtags are used on Twitter. Visit https://www.gcflearnfree.org/twitter/what-is-a-hashtag/1/ for our text-based lesson. This video includes information on: • Using hashtags • Browsing popular hashtags We hope you enjoy!

From playlist Twitter

Video thumbnail

Lukas Muechler - Quantum embedding methods for correlated excited states of point defects

Recorded 13 April 2022. Lukas Muechler of Penn State University, Chemistry, presents "Quantum embedding methods for correlated excited states of point defects: Case studies and challenges" at IPAM's Model Reduction in Quantum Mechanics Workshop. Abstract: A quantitative description of the

From playlist 2022 Model Reduction in Quantum Mechanics Workshop

Related pages

Cryptanalysis | Block cipher | Feistel cipher | Key (cryptography) | Block size (cryptography) | Linear cryptanalysis | Differential cryptanalysis | Cryptography | Data Encryption Standard