An improvement of Davies’ attack on DES |
| |
Authors: | Eli Biham Alex Biryukov |
| |
Affiliation: | (1) Computer Science Department, Technion—Israel Institute of Technology, 32000 Haifa, Israel;(2) Applied Mathematics Department, Technion—Israel Institute of Technology, 32000 Haifa, Israel |
| |
Abstract: | In this paper we improve Davies’ attack [2] on DES to become capable of breaking the full 16-round DES faster than the exhaustive search. Our attack requires 250 known plaintexts and 250 complexity of analysis. If independent subkeys are used, a variant of this attack can find 26 bits out of the 768 key bits using 252 known plaintexts. All the 768 bits of the subkeys can be found using 260 known plaintexts. The data analysis requires only several minutes on a SPARC workstation. Therefore, this is the third successful attack on DES, faster than brute force, after differential cryptanalysis [1] and linear cryptanalysis [5]. We also suggest criteria which make the S-boxes immune to this attack. |
| |
Keywords: | Data Encryption Standard (DES) Cryptanalysis |
本文献已被 SpringerLink 等数据库收录! |
|