Differential Cryptanalysis of the full 16-round DES
نویسندگان
چکیده
of n, if p > 2 ?40:2 then the number of analyzed plaintexts is two and the complexity of the data analysis phase is 2 32. However, using about four times as many chosen plaintexts, we can use the clique algorithm (described in 1]) and reduce the time complexity of the data analysis phase to less than a second on a personal computer. The known plaintext attacks need about 2 32 p ?0:5 known plaintexts (in this case the symmetry does not help). The application of the known plaintext attack to eight rounds needs a pool of 2 38:5 known plaintexts. The application to 12 rounds needs a pool of 2 47:2 known plaintexts. The application to 15 rounds needs a pool of 2 55:6 known plaintexts and the application to the full 16-round DES needs a pool of 2 55:1 known plaintexts. This is slightly worse than the 2 55 complexity of exhaustive search (which in the case of a known plaintext attack requires about 2 33 plaintexts in order to generate a complementary pair via the birthday paradox). This speciic attack is not directly applicable to plaintexts consisting solely of ASCII characters since such plaintexts cannot give rise to the desired XOR diierences. By using several other iterative characteristics we can attack the full 16-round DES with a pool of about 2 49 chosen ASCII plaintexts (out of the 2 56 possible ASCII plaintexts).
منابع مشابه
A new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملImpossible Differential Cryptanalysis on Deoxys-BC-256
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...
متن کاملImpossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)
Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...
متن کاملDifferential Cryptanalysis for a 3-round Spn
SPNs (Substitution Permutation Networks) are one of the important architectures used for designing block ciphers. In our study, we applied differential cryptanalysis method for a 3-round SPN. We have used a 16-bit input as plaintext and 16-bit output as ciphertext and chosen the first row of the third S-box of DES (Data Encryption Standard) for the necessary S-box and ShiftRows transformation w...
متن کاملDifferential Cryptanalysis of the Full 16-Round DES
In this paper we develop the first known attack which is capable of breaking the full 16 round DES in less than the complexity of exhaustive search. The da ta analysis phase computes the key by analyzing about 2% ciphertexts in 237 time. The 2% usable ciphertexts are obtained during the data collection phase from a larger pool of 247 chosen plaintexts by a simple bit repetition criteria which d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1977