De-correlated Fast Cipher: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
mNo edit summary
imported>Sandy Harris
(replace citeseer links)
Line 6: Line 6:
  | author= Decorrelated Fast Cipher: an AES candidate
  | author= Decorrelated Fast Cipher: an AES candidate
  | date= May 1998
  | date= May 1998
  | url = http://citeseer.ist.psu.edu/gilbert98decorrelated.html
  | url = http://lasecwww.epfl.ch/php_code/publications/search.php?ref=GG%2B98
}}</ref>
}}</ref>
<ref>{{citation
<ref>{{citation
Line 15: Line 15:
  | publisher = Springer-Verlag
  | publisher = Springer-Verlag
  | date = 2000
  | date = 2000
  | url = http://citeseer.ist.psu.edu/granboulan00dfcv.html
  | url = http://lasecwww.epfl.ch/php_code/publications/search.php?ref=GNNV00
}}</ref>
}}</ref>
is a [[block cipher]] developed by a French team as a candidate for the [[AES competition]]; it did not make it into the finals. Like all AES candidates, it uses 128-bit blocks and supports key sizes of 128, 192 or 256 bits. It is a six-round Feistel cipher using a single 6 by 32 S-box.
is a [[block cipher]] developed by a French team as a candidate for the [[AES competition]]; it did not make it into the finals. Like all AES candidates, it uses 128-bit blocks and supports key sizes of 128, 192 or 256 bits. It is a six-round Feistel cipher using a single 6 by 32 S-box.

Revision as of 19:50, 5 August 2010

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

DFC or De-correlated Fast Cipher [1] [2] is a block cipher developed by a French team as a candidate for the AES competition; it did not make it into the finals. Like all AES candidates, it uses 128-bit blocks and supports key sizes of 128, 192 or 256 bits. It is a six-round Feistel cipher using a single 6 by 32 S-box.

This cipher was based on Serge Vaudenay's theoretical work on decorrelation theory. That theory gives methods of constructing ciphers which are provably immune to differential cryptanalysis, linear cryptanalysis, and any other attacks that meet some fairly broad assumptions.

However, some attacks on DFC were found by going outside those assumptions, timing attacks on some implementations [3] and a more general attack using a variant of differential analysis [4].

References

  1. Decorrelated Fast Cipher: an AES candidate (May 1998), H. Gilbert, M. Girault, P. Hoogvorst, F. Noilhan, T. Pornin, G. Poupard, J. Stern, S. Vaudenay
  2. Louis Granboulan, Phong Q. Nguyen, Fabrice Noilhan, Serge Vaudenay (2000), DFCv2, Springer-Verlag, at 57-71
  3. Ian Harvey (March 1999), The DFC Cipher: An Attack on Careless Implementations, DOI:10.1.1.42.3196
  4. Lars Knudsen & Vincent Rijmen, On the Decorrelated Fast Cipher (DFC) and Its Theory, Springer-Verlag, at pp.81–94