Improved meet-in-the-middle attacks on reduced-round DES

被引:0
|
作者
Dunkelman, Orr [1 ]
Sekar, Gautharn [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT SCD COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to protect financial transactions valued at billions of Euros. In this paper, we investigate the strength of DES against attacks that use a limited number of plaintexts and ciphertexts. By mounting meet-in-the-middle attacks on reduced-round DES, we find that up to 6-round DES is susceptible to this kind of attacks. The results of this paper lead to a better understanding on the way DES can be used.
引用
收藏
页码:86 / 100
页数:15
相关论文
共 50 条
  • [1] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya LIU
    Liang CHENG
    Zhiqiang LIU
    Wei LI
    Qingju WANG
    Dawu GU
    ScienceChina(InformationSciences), 2018, 61 (03) : 95 - 107
  • [2] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Liu, Ya
    Cheng, Liang
    Liu, Zhiqiang
    Li, Wei
    Wang, Qingju
    Gu, Dawu
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (03)
  • [3] Improved meet-in-the-middle attacks on reduced-round Piccolo
    Ya Liu
    Liang Cheng
    Zhiqiang Liu
    Wei Li
    Qingju Wang
    Dawu Gu
    Science China Information Sciences, 2018, 61
  • [4] Meet-in-the-Middle Attacks on Reduced-Round XTEA
    Sekar, Gautham
    Mouha, Nicky
    Velichkov, Vesselin
    Preneel, Bart
    TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 250 - +
  • [5] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [6] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
    Liu, Ya
    Shi, Bing
    Gu, Dawu
    Zhao, Fengyu
    Li, Wei
    Liu, Zhiqiang
    COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
  • [7] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
  • [8] Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik
    Tolba, Mohamed
    Youssef, Amr M.
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017, 2018, 10779 : 26 - 38
  • [9] Meet-in-the-Middle Attacks on Reduced-Round QARMA-64/128
    Li, Rongjia
    Jin, Chenhui
    COMPUTER JOURNAL, 2018, 61 (08): : 1158 - 1165
  • [10] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692