Related Key Cryptanalysis of WAY Biham DES CAST DES X NewDES RC and TEA
نویسندگان
چکیده
We present new related key attacks on the block ciphers WAY Biham DES CAST DES X NewDES RC and TEA Di er ential related key attacks allow both keys and plaintexts to be chosen with speci c di erences KSW Our attacks build on the original work showing how to adapt the general attack to deal with the di culties of the individual algorithms We also give speci c design principles to protect against these attacks
منابع مشابه
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA
We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principl...
متن کاملRelated - Key Cryptanalysis of 3 - WAY , Biham - DES , CAST , DES
We present new related-key attacks on the block ciphers 3-ential related-key attacks allow both keys and plaintexts to be chosen with speciic diierences KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the diiculties of the individual algorithms. We also give speciic design principles to protect against these attacks.
متن کاملThe Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES
In about every book about cryptography, we learn that the plaintext complexity of differential cryptanalysis on DES is 2, as reported by Biham and Shamir in [2]. Yet few people realise that in a typical setting this estimation is not exact and too optimistic. In this note we show that the two “best” differentials for DES used by Biham and Shamir [1, 2], are not the best differentials that exist...
متن کاملConstructing Symmetric Ciphers Using the CAST Design Procedure
This paper describes the CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems which appear to have good resistance to differential cryptanalysis, linear cryptanalysis, and related-key cryptanalysis, along with a number of other desirable cryptographic properties. Details of the design choices in the procedure are given, including those...
متن کاملApplying Diierential Cryptanalysis to Des Reduced to 5 Rounds
Diierential cryptanalysis is a powerful attack developed by Eli Biham and Adi Shamir. It has been successfully applied to many DES-like cryptosystems. We provide a brief introduction to their paper BS91] and show how to apply diierential cryptanalysis to attack the Data Encryption Standard (DES) reduced to 5 rounds.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2003