DES-X (or DESX)

نویسنده

  • Alex Biryukov
چکیده

DES-X is a 64-bit block cipher with a 2 · 64 + 56 = 184-bit key, which is a simple extension of DES. The construction was suggested by Rivest in 1984 in order to overcome the problem of the short 56-bit key-size which made the cipher vulnerable to exhaustive key search attack. The idea is just to XOR a secret 64-bit key K1 to the input of DES and to XOR another 64-bit secret key K2 to the output of DES: C = K2 ⊕ DES K (P ⊕ K1). The keys K1, K2 are called whitening keys and are a popular element of modern cipher design. The construction itself goes back to the work of Shannon [5, pp.713], who suggested to use fixed mixing permutation whose input and output are masked by the secret keys. This construction has been shown to have provable security by Even-Mansour [4] if the underlying permutation is pseudorandom (i.e. computationally indistinguishable from a random permutation). A thorough study of DES-X was given in the work of Kilian-Rogaway, which builds on [4] and uses a blackbox model of security. Currently best attack on DES-X is a known-plaintext slide attack discovered by Biryukov-Wagner [1] which has complexity of 2 32.5 known plain-texts and 2 87.5 time of analysis. Moreover the attack is easily converted into a ciphertext-only attack with the same data complexity and 2 95 offline time complexity. These attacks are mainly of theoretical interest due to their high time complexities. However, the attack is generic and would work for any cipher F used together with post-and pre-whitening with complexity 2 (n+1)/2 known plaintexts and 2 k+(n+1)/2 time steps (here n is the block size, and k is the key-size of the internal cipher F. A related key-attack on DES-X is given in [6]. Best conventional attack, which exploits the internal structure of DES, would be a linear cryptanalysis attack, using 2 61 known plaintexts [2]. –Alex Biryukov.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Related-Key Attacks on Triple-DES and DESX Variants

In this paper, we present related-key slide attacks on 2-key and 3-key triple DES, and related-key differential and slide attacks on two variants of DESX. First, we show that 2-key and 3-key triple-DES are susceptible to related-key slide attacks. The only previously known such attacks are related-key differential attacks on 3-key triple-DES. Second, we present a related-key differential attack...

متن کامل

How to Protect DES Against Exhaustive Key Search

The block cipher DESX is de ned by DESXk:k1:k2(x) = k2 DESk(k1 x), where denotes bitwise exclusive-or. This construction was rst suggested by Ron Rivest as a computationally-cheap way to protect DES against exhaustive key-search attacks. This paper proves, in a formal model, that the DESX construction is sound. We show that, when F is an idealized block cipher, FXk:k1:k2(x) = k2 Fk(k1 x) is sub...

متن کامل

Improved Related-key Attacks on Desx and Desx+

In this paper, we present improved related-key attacks on the original DESX, and DESX+, a variant of the DESX with its preand post-whitening XOR operations replaced with addition modulo 2. Compared to previous results, our attack on DESX has reduced text complexity, while our best attack on DESX+ eliminates the memory requirements at the same processing complexity.

متن کامل

Attacking Triple Encryption

The standard technique to attack triple encryption is the meet-in-the-middle attack. In this paper, more eecient attacks are presented. Compared to meet-in-the-middle, our attacks either greatly reduce the number of single encryptions to be done, or somewhat reduce the overall number of steps. Especially, about 2 108 steps of computation are suucient to break three-key triple DES. If one concen...

متن کامل

Network Working Group W a Simpson Internet Draft [daydreamer] R Baldwin [rsa Data Security] Expires in Six Months

Internet Drafts are draft documents valid for a maximum of six months, and may be updated, replaced, or obsoleted by other documents at any time. It is not appropriate to use Internet Drafts as reference material, or to cite them other than as a ''working draft'' or ''work in progress.'' To learn the current status of any Internet-Draft, please check the ''1id-abstracts.txt'' listing contained ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005