A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference
暂无分享,去创建一个
I present a new attack of FEAL-4 blockcipher. The attack requires only 24 blocks of 8-byte randomly given known-plaintext. Using these blocks, we can break FEAL-4 with the probability of greater than 90%, in 14 seconds on a personal computer (cpu 80386 16MHz). It is based on the system of linear equations on the differences.
[1] Henri Gilbert,et al. A Known Plaintext Attack of FEAL-4 and FEAL-6 , 1991, CRYPTO.
[2] Shoji Miyaguchi. The FEAL-8 Cryptosystem and a Call for Attack , 1989, CRYPTO.
[3] Shoji Miyaguchi,et al. Fast Data Encipherment Algorithm FEAL , 1987, EUROCRYPT.