
Table 1. Significant differences in DES
product expected actual difference diff
rand
test()
Q
1
× Q
2
0.241739 0.216797 2.5 fail
Q
1
× Q
3
0.204115 0.179688 2.4 fail
Q
1
× Q
4
0.126188 0.077148 4.9 fail
4 Conclusions
Clearly the reason to adopt a FN structure in a block cipher is mainly due to the con-
venience it offers, such as ease of moving between encryption and decryption, and less
due to its diffusion capabilities. High diffusion in a product cipher implies that the input
bits are be treated uniformly in every round. Since this is not the case for a FN, addi-
tional complexity (e.g. more rounds) would be required. The proposed description and
metric of diffusion enables both the investigation of the topology (structure) of a FN
as well as the underlying non-linear function(s). This would allow the investigation of
FNs consisting of different round functions, with varying input and output lengths as
well as different swapping schemes (unbalanced heterogeneous FNs).
Although that the proposed approach initially aimed for studying FNs, most product
block ciphers can benefit from such an analysis.
References
1.
Feistel, H.: Block Cipher Cryptographic System, U.S. Patent #3,798,359 (1974).
2.
Feistel, H., Notz, W. A., Smith, J. L.: Some Cryptographic Techniques for Machine-to-
Machine Data Communications. Proceedings of the IEEE (1975) 1545–1554.
3. Schneier, B. and Kelsey, J.: Unbalanced Feistel networks and block cipher design. Proc. Fast
Software Encryption, Lecture Notes in Computer Science, vol. 1039, Springer-Verlag (1996)
121–144.
4.
Nakahara J. Jr., Vandewalle, J., Preneel, B.: Diffusion Analysis Of Feistel Networks (Extended
Version). citeseer.nj.nec.com/article/nakahara99diffusion.html (1999).
5. Shannon, C. E.: Communication Theory of Secrecy Systems. Bell Systems Technical Journal,
vol. 27 (1948) 623–656.
6. FIPS PUB 46: Data Encryption Standard. US Department of Commerce/ National Bureau of
Standards (1977).
7. Goldreich, O., Goldwasser, S., Micali, S.: How to Construct Random Functions. Proceedings
25th Annual Symposium in Comp. Sci. (1984).
8.
Luby, M. and Rackoff, C.: How to Construct Pseudorandom Permutations from Pseudoran-
dom Functions. SIAM J. Computing, vol.17, no.2 (1988) 373–86.
9. Biham, E. and Shamir,A.: Differential cryptanalysis of DES-like cryptosystems. Journal of
Cryptology. Vol. 4, No. 1 (1991) 3–72.
10. Webster, A. and Tavares, S.: On the design of S-boxes. In H. Williams (ed), Crypto’85, LNCS
No. 218, Springer: Berlin Heidelberg New York (1986) 523–534.
11. Pfleeger, C.: Security in Computing. London: Prentice Hall (1989).
12.
Heys, H. and Tavares, S.: Substitution Permutation Networks resistant to Differential and
Linear cryptanalysis. Journal of Cryptology, no.9, vol. 1 (1996) 1–19.
86