Improved meet-in-the-middle attacks on reduced-round DES

被引:0
|
作者
Dunkelman, Orr [1 ]
Sekar, Gautharn [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT SCD COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to protect financial transactions valued at billions of Euros. In this paper, we investigate the strength of DES against attacks that use a limited number of plaintexts and ciphertexts. By mounting meet-in-the-middle attacks on reduced-round DES, we find that up to 6-round DES is susceptible to this kind of attacks. The results of this paper lead to a better understanding on the way DES can be used.
引用
收藏
页码:86 / 100
页数:15
相关论文
共 50 条
  • [21] Meet-in-the-Middle Attacks on Round-Reduced Khudra
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
  • [22] Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (09)
  • [23] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
  • [24] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Patrick Derbez
    Léo Perrin
    Journal of Cryptology, 2020, 33 : 1184 - 1215
  • [25] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
  • [26] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1184 - 1215
  • [27] A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
    Altawy, Riham
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04): : 1246 - 1250
  • [28] Improved Meet-in-the-Middle Attacks on AES
    Demirci, Hueseyin
    Taskin, Ihsan
    Coban, Mustafa
    Baysal, Adnan
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 144 - 156
  • [29] Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2023, 17 (03) : 534 - 543
  • [30] Improved meet-in-the-middle attacks on Crypton and mCrypton
    Li, Rongjia
    Jin, Chenhui
    IET INFORMATION SECURITY, 2017, 11 (02) : 97 - 103