Preview

Des, Differential Cryptanalysis

Better Essays
Open Document
Open Document
4403 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Des, Differential Cryptanalysis
Differential Cryptanalysis of the Full 16-round DES
Eli Biham
Computer Science D e p a r t m e n t Technion - Israel Institute of Technology Haifa 32000, Israel

Adi Shamir
Department of Applied Mathematics and C o m p u t e r Science The Weizmann Institute of Science Rehovot 76100, Israel

Abstract

I this paper we develop the first known attack which is capable of breaking n the full 16 round DES in less than the complexity of exhaustive search. The d a t a analysis phase computes the key by analyzing about 2% ciphertexts in 237time. The 2% usable ciphertexts are obtained during the data collection phase from a larger pool of 247 chosen plaintexts by a simple bit repetition criteria which discards more than 99.9% of the ciphertexts as soon as they are generated. While earlier versions of differential attacks were based on huge counter arrays, the new attack requires negligible memory and can be carried out in parallel on up to 2= disconnected processors with Linear speedup. In addition, the new attack can be carried out even if the analyzed ciphertexts are derived from up to 2= different keys due to frequent key changes during the d a t a collection phase. The attack can be carried out incrementally with any number of available ciphertexts, and its probability of success grows linearly with this number (e.g., when 229 usable ciphertexts are generated from a smaller pool of 240 plaintexts, the analysis time decreases t o 230 and the probability of success is about 1%).

1

Introduction

The Data Encryption Standard (DES) is t h e best known and most widely used cryptosystem for civilian applications. It consists of 16 rounds of substitution and perm u t a t i o n operations, carried out under t h e control of a 56 bit key (see [6] for further

E.F. Brickell (Ed.): Advances in Cryptology - CRYPT0 '92, LNCS 740, pp. 487-496, 1993. 0 Springer-Verlag Berlin Heidelberg 1993

188

details). It was adopted a s a US national standard in the mid



References: [l] Eli Biham, Adi Shamir, Diflerential Cryptanalysis o j DES-like Cryptosystcms7 Journal of Cryptology, Vol. 4. So. 1. pp. 3-72, 1991. The extended abstract appears in Advances in cryptology, proceedings of CRYFTO’SO, pp. 2-21, 1990. [2] Eli Biham, .4di Shamir, DzjJerential Cryptanalysis of Feai and 11’-Hash, technical report cS91-17, Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science? 1991. The extended abstract appears in Advances in cryptology, proceedings of EUKOCRYFT’Si, pp. 1-16, 1991. [3] Eli Biham, Adi Shamir, Diflerential Crgptanafysis ofSnefru, Khafre, REDOC-[I, L O K I and Lucifer, technical report CS91-18, Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science, 1991. The extended abstract appears in Advances in cryptology, proceedings of CRYPTO’91, 1991. [4]David Chaum, Jan-Hendrik Evertse, Cryptanalysis of DES with a reduced number of rounds, Sequences of linear factors in block ciphers, Advances in cryptology, proceedings of CRYPT0’85, pp. 192-211. 1985. [5] D. W. Dat-ies, private communication. [6] National Bureau of Standards, Data Encryption Standard, G.S. Department of Commerce, FIPS pub. 46, January 1977.

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    6) Trapdoor(GP,pkS,skRi,Q): Taking GP,pkS,pkRi and a keyword queries for Q=(w1,.wm),m<=las the source of information ,it yields a trapdoor TQ, 1 for Q produced by Ri.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Huxley Maquiladora

    • 694 Words
    • 3 Pages

    Internationalization of a firm is often defined as its cross border business activities, which include trading resources and final products or services, capital transactions, and widening human resources. By adopting internationalization, a firm can expand its market size, minimize operation cost, and enhance competitiveness. Relocating production plant to Mexico from Texas, Huxley sets the first step into internationalization. The movement of the manufacturing site can save a significant amount of production costs like transport tariffs, labor payments and taxations. Huxley should utilize the benefits offered by the new location and NAFTA, and hence focus on research & development in order to improve innovation aspect. Since we enter into technology-bombard world, hi-tech is the next step to internationalize. Only by upgrading effective know-how is the solution of long-term growth and market power maintenance. There are three ways to internationalize in Mexico: subcontracting, shelter operation and wholly owned subsidiary (WOS); however in term of Huxley’s domination power, it should mainly consider shelter operation and WOS for bigger profits and larger sustainable plans with the option of locating either in Ciudad Acuna or Saltillo.…

    • 694 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 3 Lab Assignment

    • 981 Words
    • 4 Pages

    Introduction To Codes, Ciphers, & Codebreaking. (2010, July 13). Retrieved from Vectorsite: Introduction To Codes, Ciphers, & Codebreaking…

    • 981 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Traditions bring people together for a purpose of handing down beliefs or customs from generation to generation. The tradition could be for a joyous purpose like Thanksgiving or Christmas, and even a sorrowful purpose like funerals or a date like September 11. In “Mending Wall” the tradition brought two neighbors together each year to repair any damage made to their fence. However, in “The Lottery” the tradition brings the whole town together to sacrifice one person drawn in the lottery in hopes of bringing a bountiful harvest. While many traditions are important to hold over, in some instances it is essential to abolish traditions that have outrun their time in this modern age. For instance there was a law to forbid people from carrying pliers that could cut a fence made in the old days when there was the open range in Texas. Now there is no open range in Texas therefore we do not need the law anymore. The speaker in “Mending Wall” used repairing the fence as a symbol of ridding old traditions while in The Lottery everyone kept up the tradition even though people showed fear.…

    • 1768 Words
    • 8 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Answer the following questions by filling in the blank using the proper technology or cryptography terms you have learned in class:…

    • 385 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Network Associates, Inc. (1990-1999). Introduction to Cryptography. Retrieved from The International PGP Home Page: ftp://ftp.pgpi.org/pub/pgp/6.5/docs/english/IntroToCrypto.pdf…

    • 1325 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    References: 1. 2. 3. 4. 5. 6. 7. 8. Menezes, A. J. Elliptic curve public key cryptosystems. Kluwer Academic Publishers, 1993. Schneier, B. Applied cryptography. John Wiley & Sons, Inc., 1994. Enge, A. Elliptic curves and their applications to cryptography. Kluwer Academic Publishers, 1999. Menezes, A.., Oorschot, P., and Vanstone, S. Handbook of Applied Cryptography. CRC Press, 1997. Weisstein, E. W. “Number Field Sieve”. Wolfram Research, Inc. Stallings, W. Cryptography and Network Security. Prentice Hall, 2003. Silverman, R. D. “An Analysis of Shamir’s Factoring Device”. RSA Security. May 3, 1999 Shamir, A. “Factoring Large Numbers with the TWINKLE Device”. In proceedings of Cryptographic Hardware and Embedded Systems: First International Workshop, CHES '99. Lecture notes in Computer Science, vol.1717. Springer-Verlag Heidelberg, January 1999: p 2 – 12. Lercier, R. Homepage. Schneier, B. “Elliptic Curve Public Key Cryptography”. Cryptogram ENewsletter. November 15, 1999 “Remarks on the Security of the Elliptic Curve Cryptosystem”. Certicom, whitepaper. September 1997. Blake, I., Seroussi, G., and Smart, N. Elliptic Curves in Cryptography. Cambridge University Press, 1999. Menezes, A., Okamoto, T., and Vanstone, S. “Reducing elliptic curve logarithms to logarithms in a finite field”. Proceedings of the twenty-third annual ACM symposium on Theory of computing. Annual ACM Symposium on Theory of Computing. ACM Press, 1991: p 80 – 89. Satoh, T. and Araki, K. “Fermat quotients and the polynomial time discrete log algorithm for anomalous elliptic curves”. Commentarii Mathematici Universitatis Sancti Pauli 47, 1998: p 81 – 92. Semaev, I. A. “Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p”. Mathematics of Computation 67, 1998: p 353 – 356. Smart, N. “The discrete logarithm problem on elliptic curves of trace one”. Journal of Cryptography, vol. 12 no. 3. Springer-Verlag New York, October 1999: p 193 – 196. Certicom Press Release. “Certicom Announces Elliptic Curve Cryptosystem…

    • 9274 Words
    • 38 Pages
    Powerful Essays
  • Good Essays

    Fermat's Little Theorem

    • 488 Words
    • 2 Pages

    In this capsule, we show that Fermat’s Little Theorem can be derived easily from the multinomial theorem. The following steps provide the derivation. 1. All the multinomial coefficients (2) are positive integers. This is clear from the way in which they arise by repeated multiplication by (a1 + a2 + ⋅⋅⋅ + an ) in (1). 2. There are n values of the multinomial coefficient that equal 1. These occur when all but one of the indices kr = 0 , so that the remaining index equals p. For example,    0, p , 0, p, 0,  p! = 1. = , 0  0! 0! p !0! 0!…

    • 488 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Data Encryption

    • 757 Words
    • 4 Pages

    Bibliography: 1. Bay Networks, Inc. (1997). Configuring Software Encryption. www.baynetworks.com 2. Biasci, L. (1999). Cryptology. www.whatis.com. 3. Frazier, R.E., (1999). Data Encryption Techniques. www.softstrategies.com. 4. Litterio, F., (1999). Cryptology: The Study of Encryption. www.world.std.com. 5. SSH Communications Security, (1999). Cryptographic Algorithms. www.ipsec.com. 6. SSH Communications Security, (1999). Introduction to Cryptography. www.ipsec.com.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hill Cipher

    • 806 Words
    • 4 Pages

    When people started doing business online and needed to transfer funds electronically, the applications of cryptography for integrity began to surpass its use for secrecy .The constant increase of information transmitted electronically has lead to an increased reliance on cryptography and authentication. An obvious application of cryptography is the transformation of information to prevent other from observing its meaning. Secure communication is the most straightforward use of cryptography. Two people may communicate securely by encrypting the messages sent between them. The paper presents modifications of the Hill cipher generating dynamic encryption key matrix…

    • 806 Words
    • 4 Pages
    Good Essays
  • Good Essays

    What is teaching pronunciation? Mention some of the recent problem in teaching pronunciation in Nepalese context being based on those problems. Suggest some activities and techniques.…

    • 1765 Words
    • 7 Pages
    Good Essays

Related Topics