Improved meet-in-the-middle attacks on reduced-round DES

被引:0
|
作者
Dunkelman, Orr [1 ]
Sekar, Gautharn [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT SCD COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to protect financial transactions valued at billions of Euros. In this paper, we investigate the strength of DES against attacks that use a limited number of plaintexts and ciphertexts. By mounting meet-in-the-middle attacks on reduced-round DES, we find that up to 6-round DES is susceptible to this kind of attacks. The results of this paper lead to a better understanding on the way DES can be used.
引用
收藏
页码:86 / 100
页数:15
相关论文
共 50 条
  • [31] Improved Meet-in-the-Middle Attacks on Crypton and mCrypton
    Cui, Jingyi
    Guo, Jiansheng
    Huang, Yanyan
    Liu, Yipeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2660 - 2679
  • [32] Improved attacks against reduced-round Whirlwind
    Wei, Congming
    Dong, Bingyou
    Hua, Jialiang
    Dong, Xiaoyang
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3581 - 3602
  • [33] Improved attacks against reduced-round Whirlwind
    Congming Wei
    Bingyou Dong
    Jialiang Hua
    Xiaoyang Dong
    Guoyan Zhang
    Designs, Codes and Cryptography, 2023, 91 : 3581 - 3602
  • [34] Improved Meet-in-the-middle Attacks on Reduced-roundMIBS-80 Cipher br
    Ren, Jiongjiong
    Hou, Zezhou
    Li, Manman
    Lin, Dongdong
    Chen, Shaozhen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (08) : 2914 - 2923
  • [35] A New Method for Meet-in-the-Middle Attacks on Reduced AES
    Dong Xiaoli
    Hu Yupu
    Wei Yongzhuang
    Chen Jie
    CHINA COMMUNICATIONS, 2011, 8 (02) : 21 - 25
  • [36] Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC
    Li, Rongjia
    Jin, Chenhui
    IET INFORMATION SECURITY, 2019, 13 (01) : 70 - 75
  • [37] Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions
    Zhao, Shibin
    Duan, Xiaohan
    Deng, Yuanhao
    Peng, Zhiniang
    Zhu, Junhu
    IEEE ACCESS, 2019, 7 : 34416 - 34424
  • [38] Improved SQUARE attacks against reduced-round HIEROCRYPT
    Barreto, PSLM
    Rijmen, V
    Nakahara, J
    Preneel, B
    Vandewalle, J
    Kim, HY
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 165 - 173
  • [39] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [40] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471