Related Key Cryptanalysis of WAY Biham DES CAST DES X NewDES RC and TEA

نویسندگان

  • John Kelsey
  • Bruce Schneier
  • David Wagner
چکیده

We present new related key attacks on the block ciphers WAY Biham DES CAST DES X NewDES RC and TEA Di er ential related key attacks allow both keys and plaintexts to be chosen with speci c di erences KSW Our attacks build on the original work showing how to adapt the general attack to deal with the di culties of the individual algorithms We also give speci c design principles to protect against these attacks

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA

We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principl...

متن کامل

Related - Key Cryptanalysis of 3 - WAY , Biham - DES , CAST , DES

We present new related-key attacks on the block ciphers 3-ential related-key attacks allow both keys and plaintexts to be chosen with speciic diierences KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the diiculties of the individual algorithms. We also give speciic design principles to protect against these attacks.

متن کامل

The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES

In about every book about cryptography, we learn that the plaintext complexity of differential cryptanalysis on DES is 2, as reported by Biham and Shamir in [2]. Yet few people realise that in a typical setting this estimation is not exact and too optimistic. In this note we show that the two “best” differentials for DES used by Biham and Shamir [1, 2], are not the best differentials that exist...

متن کامل

Constructing Symmetric Ciphers Using the CAST Design Procedure

This paper describes the CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems which appear to have good resistance to differential cryptanalysis, linear cryptanalysis, and related-key cryptanalysis, along with a number of other desirable cryptographic properties. Details of the design choices in the procedure are given, including those...

متن کامل

Applying Diierential Cryptanalysis to Des Reduced to 5 Rounds

Diierential cryptanalysis is a powerful attack developed by Eli Biham and Adi Shamir. It has been successfully applied to many DES-like cryptosystems. We provide a brief introduction to their paper BS91] and show how to apply diierential cryptanalysis to attack the Data Encryption Standard (DES) reduced to 5 rounds.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003