Improved meet-in-the-middle attacks on reduced-round DES

被引:0
|
作者
Dunkelman, Orr [1 ]
Sekar, Gautharn [1 ]
Preneel, Bart [1 ]
机构
[1] Katholieke Univ Leuven, Dept Elect Engn ESAT SCD COSIC, B-3001 Heverlee, Belgium
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Data Encryption Standard (DES) is a 64-bit block cipher. Despite its short key size of 56 bits, DES continues to be used to protect financial transactions valued at billions of Euros. In this paper, we investigate the strength of DES against attacks that use a limited number of plaintexts and ciphertexts. By mounting meet-in-the-middle attacks on reduced-round DES, we find that up to 6-round DES is susceptible to this kind of attacks. The results of this paper lead to a better understanding on the way DES can be used.
引用
收藏
页码:86 / 100
页数:15
相关论文
共 50 条
  • [41] Improved Collision Attacks on the Reduced-Round Grostl Hash Function
    Ideguchi, Kota
    Tischhauser, Elmar
    Preneel, Bart
    INFORMATION SECURITY, 2011, 6531 : 1 - 16
  • [42] Preimage Attacks on Reduced-Round Stribog
    AlTawy, Riham
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 109 - 125
  • [43] Improved Meet-in-the-Middle Nostradamus Attacks on AES-like Hashing
    Dong, Xiaoyang
    Guo, Jian
    Li, Shun
    Pham, Phuong
    Zhang, Tianyu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (01) : 158 - 187
  • [44] Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
    Akshima
    Chang, Donghoon
    Ghosh, Mohona
    Goel, Aarushi
    Sanadhya, Somitra Kumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 198 - 217
  • [45] Improved Meet-in-the-Middle Preimage Attacks against AES Hashing Modes
    Bao, Zhenzhen
    Ding, Lin
    Guo, Jian
    Wang, Haoyang
    Zhang, Wenying
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 318 - 347
  • [46] Improved key recovery attacks on reduced-round Salsa20
    Dey, Sabyasachi
    Leander, Gregor
    Sharma, Nitin Kumar
    DESIGNS CODES AND CRYPTOGRAPHY, 2025, 93 (01) : 243 - 262
  • [47] Meet-in-the-middle attacks on FOX block cipher
    Li R.-J.
    Jin C.-H.
    Tongxin Xuebao/Journal on Communications, 2016, 37 (08): : 185 - 190
  • [48] Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
    Biryukov, Alex
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 3 - 27
  • [49] Meet-in-the-Middle Attacks on Generic Feistel Constructions
    Guo, Jian
    Jean, Jeremy
    Nikolic, Ivica
    Sasaki, Yu
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 458 - 477
  • [50] Related-key and meet-in-the-middle attacks on triple-DES and DES-EXE
    Choi, JM
    Kim, JS
    Sung, JC
    Lee, S
    Lim, J
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, PT 2, 2005, 3481 : 567 - 576