The cryptanalysis of FEAL-4 with 20 chosen plaintexts
Journal of Cryptology
Correlation properties of combiners with memory in stream ciphers
Journal of Cryptology - Eurocrypt '90
A Statistical Attack of the FEAL-8 Cryptosystem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Differential cryptanalysis of feal and N-hash
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Fast data encipherment algorithm FEAL
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Differential Attack on Message Authentication Codes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Linear Cryptanalysis of the Fast Data Encipherment Algorithm
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
On Linear Cryptanalysis with Many Linear Approximations
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
A new method for known plaintext attack of FEAL cipher
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Algebraic cryptanalysis of the data encryption standard
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
On the nonlinearity of exponential welch costas functions
IEEE Transactions on Information Theory
On unbiased linear approximations
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Accurate estimates of the data complexity and success probability for various cryptanalyses
Designs, Codes and Cryptography
KFC - The Krazy Feistel Cipher
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Pseudorandom permutation families over abelian groups
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Hi-index | 0.06 |
We present new results on the cryptanalysis of the FEAL-N blockcipher. As a matter of fact, almost all the attacks of this cryptosystem published so far are chosen plaintext attacks [3,4,5,7], except the announcement in [7] of a non-differential known plaintext attack of FEAL-4 which requires about 100000 plaintext blocks. We describe known plaintext attacks of FEAL-4 and FEAL-6, which require about 1000 and 20000 plaintext blocks respectively and are based on correlations with linear functions. Using similar methods, we have also found more recently an improved attack on FEAL-4, which requires only 200 knwon plaintext blocks.