Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA

نویسندگان

  • John Kelsey
  • Bruce Schneier
  • David A. Wagner
چکیده

We present new related-key attacks on the block ciphers 3WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differential related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principles to protect against these attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Related Key Cryptanalysis of WAY Biham DES CAST DES X NewDES RC and TEA

We present new related key attacks on the block ciphers WAY Biham DES CAST DES X NewDES RC and TEA Di er ential related key attacks allow both keys and plaintexts to be chosen with speci c di erences KSW Our attacks build on the original work showing how to adapt the general attack to deal with the di culties of the individual algorithms We also give speci c design principles to protect against...

متن کامل

Related - Key Cryptanalysis of 3 - WAY , Biham - DES , CAST , DES

We present new related-key attacks on the block ciphers 3-ential related-key attacks allow both keys and plaintexts to be chosen with speciic diierences KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the diiculties of the individual algorithms. We also give speciic design principles to protect against these attacks.

متن کامل

The Best Differential Characteristics and Subtleties of the Biham-Shamir Attacks on DES

In about every book about cryptography, we learn that the plaintext complexity of differential cryptanalysis on DES is 2, as reported by Biham and Shamir in [2]. Yet few people realise that in a typical setting this estimation is not exact and too optimistic. In this note we show that the two “best” differentials for DES used by Biham and Shamir [1, 2], are not the best differentials that exist...

متن کامل

Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography

In the era of information technology, security is essential to transmit confidential information (like credit card details, banking transactions etc) over the unsecured network like internet. It is possibility that the information that is being transferred through network of computers or internet being read by other people. For this we need an efficient and secure way to protect our data. Crypt...

متن کامل

Constructing Symmetric Ciphers Using the CAST Design Procedure

This paper describes the CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems which appear to have good resistance to differential cryptanalysis, linear cryptanalysis, and related-key cryptanalysis, along with a number of other desirable cryptographic properties. Details of the design choices in the procedure are given, including those...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997