-
July 4th, 2007, 01:41 PM
#1
Junior Member
Generalized and Modified Feistel
Hi guys,
someone knows what is the difference between a Feistel Network and its modified versions? And between a Feistel Network and its generalized versions? Some useful links that allows me to understand which are all these versions?
Thanks.
-
July 4th, 2007, 02:36 PM
#2
Oliver's Law:
Experience is something you don't get until just after you need it.
-
July 4th, 2007, 03:04 PM
#3
Junior Member
Excuse me, but I do not see where is the answer to my question.
-
July 4th, 2007, 03:23 PM
#4
List of Feistel ciphers
Feistel or modified Feistel: Blowfish, Camellia, CAST-128, DES, FEAL, ICE, KASUMI, LOKI97, Lucifer, MARS, MAGENTA, MISTY1, RC5, TEA, Triple DES, Twofish, XTEA
Generalised Feistel: CAST-256, MacGuffin, RC2, RC6, Skipjack
right there on the site, read them and find the differences, or do you want us to read it for you too and make a list of all the differences...?
-
July 4th, 2007, 03:30 PM
#5
Hi
Omero77, the article is actually a fairly good starting point to answer your questions.
If you read it, you would have learned that there are several kinds of
generalisations of a Feistel Network / cipher.
Generalisations generally refer to modifications of such a kind that the
traditional Feistel Network is a subset of the generalised version.
For example, an unbalanced Feistel Network (one generalisation) can be
mapped to the traditional one by setting L_0 = R_0. If you would read
the description of the Skipjack algorithm you see that a 80bit key is used
to encrypt a 64bit data block.
Now, if you are confused by that, first learn about the construction of a
blockcipher.
There are other types of generalisations (e.g. realised in GDES (not mentioned
in the article), realised in RC2, ...) and even an actual example is the "new"
CLEFIA[1], invented by Sony, which enables the Feistel Network to apply in a
feasible way diffusion switching. In traditional Feistel Networks, this
techniques is too costly.
...
or do you want us to read it for you too and make a list of all the differences...?
Haha, I am close to ...
Cheers
[1] http://www.sony.net/SonyInfo/News/Pr...28E/index.html
If the only tool you have is a hammer, you tend to see every problem as a nail.
(Abraham Maslow, Psychologist, 1908-70)
-
July 4th, 2007, 04:06 PM
#6
Junior Member
I did not mean to give annoyance to nobody and not even that someone read all for me. I had only need of knowing which are the differences in via completely general and not entering in the details today (I am able to do this alone because I am not abolutely confused on the priciples of block ciphers). If I had time to enter in the details by nowI would not post the question on the forum.
Perhaps I am not the only that don't know the answer.
Look at this.
http://www.sis.uncc.edu/~yzheng/publ...cipher-fig.pdf
My question was if there were some other varying beyond these!
I'll resolve this "LITTLE" problem alone.
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|