Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Advances in Cryptology — EUROCRYPT ’91
  3. Conference paper

Differential Cryptanalysis of Feal and N-Hash

  • Conference paper
  • First Online: 01 January 2001
  • pp 1–16
  • Cite this conference paper
Advances in Cryptology — EUROCRYPT ’91 (EUROCRYPT 1991)
Differential Cryptanalysis of Feal and N-Hash
  • Eli Biham4 &
  • Adi Shamir4 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 547))

Included in the following conference series:

  • Workshop on the Theory and Application of of Cryptographic Techniques
  • 5592 Accesses

  • 60 Citations

  • 5 Altmetric

Abstract

In [1,2] we introduced the notion of differential cryptanalysis and described its application to DES [8] and several of its variants. In this paper we show the applicability of differential cryptanalysis to the Feal family of encryption algorithms and to the N-Hash hash function.

Download to read the full chapter text

Chapter PDF

Similar content being viewed by others

Differential Cryptanalysis of FEAL4 Using Evolutionary Algorithm

Chapter © 2016

Deep and Wide Neural Networks for Distinguisher Attacks

Chapter © 2024

Quantum differential cryptanalysis based on Bernstein-Vazirani algorithm

Article Open access 18 December 2024

Explore related subjects

Discover the latest articles, books and news in related subjects, suggested using machine learning.
  • Computational Mathematics and Numerical Analysis
  • Computer Science
  • Cryptology
  • Differential Geometry
  • Special Functions
  • Personality and Differential Psychology

References

  1. Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems (extended abstract), Advances in cryptology, proceedings of CRYPTO 90, 1990.

    Google Scholar 

  2. Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems, accepted by the Journal of Cryptology, 1990.

    Google Scholar 

  3. Bert Den Boer, Cryptanalysis of F.E.A.L., Advances in cryptology, proceedings of EUROCRYPT 88, 1988.

    Google Scholar 

  4. Shoji Miyaguchi, Feal-N specifications.

    Google Scholar 

  5. Shoji Miyaguchi, News on Feal cipher, talk at the RUMP session at CRYPTO 90, 1990.

    Google Scholar 

  6. S. Miyaguchi, K. Ohta, M. Iwata, 128-bit hash function (N-Hash), proceedings of SECURICOM 90, pp. 123–137, March 1990.

    Google Scholar 

  7. Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm Feal-8, Review of electrical communications laboratories, Vol. 36, No. 4, 1988.

    Google Scholar 

  8. National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.

    Google Scholar 

  9. Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm Feal, Advances in cryptology, proceedings of EUROCRYPT 87, pp. 267, 1987.

    Google Scholar 

  10. Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm Feal, Abstracts of EUROCRYPT 87, Amsterdam, April 1987.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot, 76100, Israel

    Eli Biham & Adi Shamir

Authors
  1. Eli Biham
    View author publications

    Search author on:PubMed Google Scholar

  2. Adi Shamir
    View author publications

    Search author on:PubMed Google Scholar

Editor information

Editors and Affiliations

  1. Royal Holloway and Bedford New College, Univ. of London, Egham Hill, Surrey, TW20 0EX, UK

    Donald W. Davies

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Biham, E., Shamir, A. (1991). Differential Cryptanalysis of Feal and N-Hash. In: Davies, D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46416-6_1

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/3-540-46416-6_1

  • Published: 18 May 2001

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54620-7

  • Online ISBN: 978-3-540-46416-7

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Language editing
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

173.236.255.191

Not affiliated

Springer Nature

© 2025 Springer Nature