Number of Rounds
The cryptographic strength of a Feistel cipher derives from
three aspects of the design: the number of rounds, the function F, and the key
schedule algorithm. Let us look first at the choice of the number of rounds.
The greater the number of rounds, the more difficult it is to
perform cryptanalysis, even for a relatively weak F. In general, the criterion
should be that the number of rounds is chosen so that known cryptanalytic
efforts require greater effort than a simple brute-force key search attack. This
criterion was certainly used in the design of DES. Schneier [SCHN96] observes that for 16-round
DES, a differential cryptanalysis attack is slightly less efficient than brute
force: the differential cryptanalysis attack requires 255.1
operations,[9]
whereas brute force requires 255. If DES had 15 or fewer rounds,
differential cryptanalysis would require less effort than brute-force key
search.
[9] Recall that differential cryptanalysis of DES requires 247 chosen plaintext. If all you have to work with is known plaintext, then you must sort through a large quantity of known plaintext-ciphertext pairs looking for the useful ones. This brings the level of effort up to 255.1.
This criterion is attractive because it makes it easy to judge
the strength of an algorithm and to compare different algorithms. In the absence
of a cryptanalytic breakthrough, the strength of any
algorithm that satisfies the criterion can be judged solely on key
length.
No comments:
Post a Comment