6
Feistel Model Last Updated: Aug 27, 2013 CS 465

Feistel Model

  • Upload
    baakir

  • View
    37

  • Download
    2

Embed Size (px)

DESCRIPTION

CS 465. Feistel Model. Last Updated: Aug 27, 2013. Feistel Cipher Structure. Described by Horst Feistel (IBM) in 1973 Many symmetric encryption algorithms use this structure DES, IDEA, Blowfish, RC6, MARS, Twofish Not AES Substitution-permutation network Block cipher - PowerPoint PPT Presentation

Citation preview

Page 1: Feistel  Model

Feistel Model

Last Updated: Aug 27, 2013

CS 465

Page 2: Feistel  Model

Feistel Cipher Structure

• Described by Horst Feistel (IBM) in 1973• Many symmetric encryption algorithms use this structure

o DES, IDEA, Blowfish, RC6, MARS, Twofisho Not AES

• Substitution-permutation network• Block cipher• Features – block size, key size, number of rounds, sub-

key generation algorithm, round function• Decryption is essentially the same as encryption

o Input: ciphertexto Use sub-keys in reverse order

• Sourceso Stallings NSE Fig 2.2 (next slide)o Wikipedie: Feistel Cipher

Page 3: Feistel  Model

Source: Network Security Essentials (Stallings)

Page 4: Feistel  Model

Source: Network Security Essentials (Stallings)

Page 5: Feistel  Model

The Feistel Network Round Function (F)

• The Feistel network is guaranteed to be reversible if we can reconstruct its inputs, which are derived from the key

• It doesn’t matter how complicated or simple F is or if it can be inverted

Page 6: Feistel  Model

Proof of Feistel Network

• On the board

• What is the disadvantage of a 1-round Feistel network?