Differential Cryptanalysis of Feal and N-Hash

In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES[8] and several of its variants. In this paper we show the applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function.

[1]  Shoji Miyaguchi,et al.  Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.

[2]  A. Shimizu,et al.  Fast data encipherment algorithm FEAL-8 , 1978 .

[3]  Shoji Miyaguchi The FEAL Cipher Family , 1990, CRYPTO.

[4]  Bert den Boer Cryptanalysis of F.E.A.L , 1988, EUROCRYPT.

[5]  Henri Gilbert,et al.  A Statistical Attack of the FEAL-8 Cryptosystem , 1990, CRYPTO.

[6]  Ralph Howard,et al.  Data Encryption Standard , 1987, Definitions.

[7]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[8]  Walter Fumy,et al.  On the F-function of FEAL , 1987, CRYPTO.