Skip to main content

Cryptography Primitive II: Feistel Network

 Feistel Networks are building blocks of many stream cipher notably DES, SwordFish etc, wherein one performs a fixed number of rounds of the feistel network, for both excryptopn and decrypton.

Feistel Network

The abbreviations are as follows,

  1. F: Round function
  2. Ki: Subkey for round i
  3. Li: Left half of the intermediate value at round i, L0 would be the left half of clear text.
  4. Ri: Right half of the intermediate value at round i, R0 would be the right half of clear text.
Micheal Luby and Charles Rackoff proved that, 
If the round function is a cryptographically secure pseudorandom function, then 3 rounds are sufficient to make the block cipher a pseudorandom permutation, while 4 rounds are sufficient to make it a "strong" pseudorandom permutation.

Strong psuedorandom permutation means that it remains pseudorandom even to an adversary who gets oracle access to its inverse permutation.

Note that in one round of a feistal network, only the left half of the cleartext is encrypted, while the right half is simply exchanged position with the encrypted left half.

Comments

Popular posts from this blog

Multimaster replication with Symmetric DS

Symmetric DS is an awesome tool for trigger based replication whcih works for all major database vendors, including but not limited to PostgreSQL, MySQL, MSSQL, Oracle and many others. Symmetric-DS is a java application and can execute on any platform on whcih JRE is available including Windows and Linux. Trigger based replication, in constrast to disk based (eg. DRBD ) or transaction log file shipping based or statement based , works by registering triggers on DMLs and sending the data thus generated to remote machines. Another very popular trigger based DB replication tool is Slony . Symmetric-DS in addition to being database agnostic also supports multi-master replication (MMR). MMR usecase involves multiple database nodes, connected in a pool with DML updates coming from any of them. This is different from the normal master-slave replication, where slaves are not expected to generate any data events, and the sole authority of database is the master. MMR requirement causes d...

Reset root password RHEL/Rocky/CentOS 9

Unlike the earlier versions of Rethat variants, version 9 doesn't allow single user mode to change password, as maintanance mode in 9 requires root password . Single user mode (runlevel 1) can easily be obtained by appending the word ' single ' at the end of the line starting with 'linux' by editing the entry in boot menu by pressing ' e ' at boot menu. To reset the root password on the other hand, one requires to follow a specific set of commands, At the boot menu, edit rescue mode to append 'rd.break ' at the end of the line starting with kernel. Boot with the edited line by pressing Ctrl+X or F10. At the new prompt starting with switch_root, type the following commands, mount -o remount, rw /sysroot chroot /sysroot touch /.autorelabel passwd <new root password> exit reboot       

Album Art from Google Image Search

I am sort of a perfectionist and when it comes to keeping things cleaned up, I can bet no one can beat me!! My Android phone, Motorola Quench XT3(never heard of it! Yeah, it's an Asia specific product from Motorola) has a nice feature of showing album art for songs, as is there in VLC , the epic product from VideoLAN , WMP , the shitty product from Microsoft Corp (which MS has made less shitty in Windows 7 and more) and the lesser known (among mainstream PC and MAC users Rhythmbox , the default music player featured in Ubuntu , the blue eyed kid of Canonical Inc .). But for me the turning point was when I can view album arts in my phone while listening to music and it became an absolute necessity that every song I play on my Android must have an apt album art, not the stupid, moronic default album art which Android features, The default album art of Android Anyways, I search on the internet for a suitable program which would do this thing for me on my computer that i...