Security of the Misty structure using involutions as round functions

Jooyoung Lee, Bonwook Koo

Research output: Contribution to journalArticlepeer-review

2 Scopus citations

Abstract

In this paper, we study the security of the MISTY structure, where each round function is chosen at random from the set of involutions. Based on the game-playing framework, we prove the pseudorandomness of the 3-round R-MISTY structure and the 4-round L-MISTY structure as well as the super- pseudorandomness of the 5-round R-MISTY structure for mK 2n/2,where m denotes the number of queries and 2n denotes the block size. We also give similar results for the MISTY structures such that each round function is chosen at random from the set of involutions with a constant number of fixed points. Our results generalize the results of giving the first construction of a (strong) pseudorandom permutation based on random involutions (without any restriction on the number of fixed points), and suggest a new criterion for design of block ciphers in an involutional MISTY structure that each round function should have a constant number of fixed points.

Original languageEnglish
Pages (from-to)1612-1619
Number of pages8
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE93-A
Issue number9
DOIs
StatePublished - Sep 2010

Keywords

  • Involution
  • MISTY structure
  • Pseudorandomness

Fingerprint

Dive into the research topics of 'Security of the Misty structure using involutions as round functions'. Together they form a unique fingerprint.

Cite this