Applying Diierential Cryptanalysis to Des Reduced to 5 Rounds
نویسنده
چکیده
Diierential cryptanalysis is a powerful attack developed by Eli Biham and Adi Shamir. It has been successfully applied to many DES-like cryptosystems. We provide a brief introduction to their paper BS91] and show how to apply diierential cryptanalysis to attack the Data Encryption Standard (DES) reduced to 5 rounds.
منابع مشابه
The Security of Macguun
This paper examines MacGuun, a recently proposed block cipher based on a new DES-like architecture. The strength of MacGuun against diierential cryptanalysis is investigated: DES is more resistant to these attacks. A diierential attack requiring 2 51:5 chosen plaintexts is described. In addition, the internal components of MacGuun are shown to be sub-optimal with respect to diierential cryptana...
متن کاملCryptanalysis of the CFB mode of the DES witha reduced number
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a diierential attack, and a linear attack. These attacks are based on the same principles as the corresponding attacks on the ECB mode. They are compared to the three basic attacks on the CFB mode, namely an exhaustive key search, a comparison attack, and a...
متن کاملImproved Characteristics for Diierential Cryptanalysis of Hash Functions Based on Block Ciphers
In this paper we present an improvement of the diierential attack on hash functions based on block ciphers. By using the speciic properties of the collision attack on hash functions, we can greatly reduce the work factor to nd a pair that follows the characteristic. We propose a new family of diierential characteristics that is especially useful in combination with our improvement. Attacks on a...
متن کاملCryptanalysis of Mcguun
This paper shows that the actual proposal for an unbalanced Feistel network by Schneier and Blaze is as vulnerable to diierential cryptanalysis as the DES. 1 McGuun Schneier and Blaze introduce in SB95] a new kind of block ciphers: the Generalized Unbalanced Feistel Network. Together with the general architecture they give a complete speciication of an example. The basic idea is to split the in...
متن کاملDiierential Cryptanalysis of the Ice Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against diierential and linear cryptanalysis. In this paper we will show however that we can use low Hamming weighted diierences to perform a practical, key dependent , diierential attack on ICE. The main conclusion is that t...
متن کامل