首页 | 本学科首页   官方微博 | 高级检索  
     


An improvement of Davies’ attack on DES
Authors:Eli Biham  Alex Biryukov
Affiliation:(1) Computer Science Department, Technion—Israel Institute of Technology, 32000 Haifa, Israel;(2) Applied Mathematics Department, Technion—Israel Institute of Technology, 32000 Haifa, Israel
Abstract:In this paper we improve Davies’ attack [2] on DES to become capable of breaking the full 16-round DES faster than the exhaustive search. Our attack requires 250 known plaintexts and 250 complexity of analysis. If independent subkeys are used, a variant of this attack can find 26 bits out of the 768 key bits using 252 known plaintexts. All the 768 bits of the subkeys can be found using 260 known plaintexts. The data analysis requires only several minutes on a SPARC workstation. Therefore, this is the third successful attack on DES, faster than brute force, after differential cryptanalysis [1] and linear cryptanalysis [5]. We also suggest criteria which make the S-boxes immune to this attack.
Keywords:Data Encryption Standard (DES)  Cryptanalysis
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号