Key scheduling in DES type cryptosystems
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Slide Attacks with a Known-Plaintext Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
A Framework for Describing Block Cipher Cryptanalysis
IEEE Transactions on Computers
Reducing the exhaustive key search of the Data Encryption Standard (DES)
Computer Standards & Interfaces
Algebraic and Slide Attacks on KeeLoq
Fast Software Encryption
Slide Attacks on a Class of Hash Functions
ASIACRYPT '08 Proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On hashing with tweakable ciphers
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Amplifying side-channel attacks with techniques from block cipher cryptanalysis
CARDIS'06 Proceedings of the 7th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications
Advanced slide attacks revisited: realigning slide on DES
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Hi-index | 0.00 |
The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key schedules, for example the slide attacks. In this paper we present new interesting key-pairs of the DES that can be used in related-key attacks to produce sliding properties of the full-round DES key schedule. This is a sort of key schedule weakness from a slide attack point of view. Our results demonstrate the first known sliding property of the original DES key schedule for its full 16 rounds. Finally, we consider potential applications of these findings in extending the slide attacks.