Dependence of output on input in DES: small avalanche characteristics
Proceedings of CRYPTO 84 on Advances in cryptology
Structure in the S-boxes of the DES
Proceedings on Advances in cryptology---CRYPTO '86
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Fast data encipherment algorithm FEAL
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of the data encryption standard by the method of formal coding
Proceedings of the 1982 conference on Cryptography
A cryptographic library for the Motorola DSP56000
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Message authentication with one-way hash functions
ACM SIGCOMM Computer Communication Review
The Data Encryption Standard (DES) and its strength against attacks
IBM Journal of Research and Development
On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Design of practical and provably good random number generators
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
Highly nonlinear balanced boolean functions with good local and global avalanche characteristics
Information Processing Letters
Boolean Function Design Using Hill Climbing Methods
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Difference Distribution Attack on DONUT and Improved DONUT
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Slide Attacks with a Known-Plaintext Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
On Maximum Non-averaged Differential Probability
SAC '98 Proceedings of the Selected Areas in Cryptography
Efficient Evaluation of Security against Generalized Interpolation Attack
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A Known Plaintext Attack of FEAL-4 and FEAL-6
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Systematic Design of Two-Party Authentication Protocols
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of the Full 16-Round DES
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Differential Attack on Message Authentication Codes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Computer Aided Systems Theory - EUROCAST 2001-Revised Papers
New Block Cipher DONUT Using Pairwise Perfect Decorrelation
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Impossible Differential Cryptanalysis of Zodiac
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Differential and Linear Cryptanalysis of a Reduced-Round SC2000
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Construction of Data Dependent Chaotic Permutation Hashes to Ensure Communications Integrity
ICN '01 Proceedings of the First International Conference on Networking-Part 2
Selecting the Advanced Encryption Standard
IEEE Security and Privacy
Differential and linear cryptanalysis for 2-round SPNs
Information Processing Letters
Design and evaluation of a block encryption algorithm using dynamic-key mechanism
Future Generation Computer Systems - Special issue: Modeling and simulation in supercomputing and telecommunications
A Framework for Evaluating Storage System Security
FAST '02 Proceedings of the 1st USENIX Conference on File and Storage Technologies
Multi-objective optimisation of bijective S-boxes
New Generation Computing - Evolutionary computation
The design of S-boxes by simulated annealing
New Generation Computing - Evolutionary computation
Projective aspects of the AES inversion
Designs, Codes and Cryptography
Algorithm of cipher text containing key to produce cipher text transmitted in network security
AIKED'07 Proceedings of the 6th Conference on 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and Data Bases - Volume 6
Designing substitution boxes for secure ciphers
International Journal of Innovative Computing and Applications
On the iterative construction of bent functions
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Data transmission encryption and decryption algorithm in network security
SMO'06 Proceedings of the 6th WSEAS International Conference on Simulation, Modelling and Optimization
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Design of secure hardware for ATM networks
TELE-INFO'05 Proceedings of the 4th WSEAS International Conference on Telecommunications and Informatics
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
On the Classification of 4 Bit S-Boxes
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Two New Techniques of Side-Channel Cryptanalysis
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
Efficient Hash Collision Search Strategies on Special-Purpose Hardware
Research in Cryptology
New Stream Cipher Designs
Impossible Differential Cryptanalysis of CLEFIA
Fast Software Encryption
Cryptanalysis of Reduced-Round SMS4 Block Cipher
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Preimages for Reduced SHA-0 and SHA-1
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms
ISICA '08 Proceedings of the 3rd International Symposium on Advances in Computation and Intelligence
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Memoryless Related-Key Boomerang Attack on the Full Tiger Block Cipher
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
On the Correctness of an Approach against Side-Channel Attacks
ISPEC '09 Proceedings of the 5th International Conference on Information Security Practice and Experience
Attacks on the DECT Authentication Mechanisms
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Collect and broadcast news in security
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Saturation Attack on the Block Cipher HIGHT
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
The Key-Dependent Attack on Block Ciphers
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Key dependent operation and algorithm specific complexity of statistical side channel attacks
ICT'09 Proceedings of the 16th international conference on Telecommunications
IT-security and privacy: design and use of privacy-enhancing security mechanisms
IT-security and privacy: design and use of privacy-enhancing security mechanisms
Differential cryptanalysis of feal and N-hash
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
New approaches to the design of self-synchronizing stream ciphers
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Differential cryptanalysis mod 232 with applications to MD5
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
Related-key rectangle attack on 43-round SHACAL-2
ISPEC'07 Proceedings of the 3rd international conference on Information security practice and experience
Hardware design and analysis of block cipher components
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
On the optimality of linear, differential, and sequential distinguishers
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Simple identity-based cryptography with mediated RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
The delicate issues of addition with respect to XOR differences
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Randomness and representation of span n sequences
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
CT-RSA'08 Proceedings of the 2008 The Cryptopgraphers' Track at the RSA conference on Topics in cryptology
Evolutionary design of resilient substitution boxes: from coding to hardware implementation
ICES'07 Proceedings of the 7th international conference on Evolvable systems: from biology to hardware
Differential analysis of GOST encryption algorithm
Proceedings of the 3rd international conference on Security of information and networks
Improving the generalized Feistel
FSE'10 Proceedings of the 17th international conference on Fast software encryption
Algorithms and theory of computation handbook
On the nonlinearity of exponential welch costas functions
IEEE Transactions on Information Theory
ACRI'10 Proceedings of the 9th international conference on Cellular automata for research and industry
Processing certificate of authorization with watermark based on grid environment
ICCCI'10 Proceedings of the Second international conference on Computational collective intelligence: technologies and applications - Volume Part II
Differential-multiple linear cryptanalysis
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Gemstone: a new stream cipher using coupled map lattice
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Proposition of two cipher structures
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Algebraic cryptanalysis of curry and flurry using correlated messages
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
A framework for evaluating storage system security
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
The (related-key) impossible boomerang attack and its application to the AES block cipher
Designs, Codes and Cryptography
On the security of 4-bit involutive S-boxes for lightweight designs
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
Differential cryptanalysis of round-reduced PRINTCIPHER: computing roots of permutations
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Multiple differential cryptanalysis: theory and practice
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Practical near-collisions and collisions on round-reduced ECHO-256 compression function
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Breaking Grain-128 with dynamic cube attacks
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
On maximum differential probability of generalized Feistel
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Algebraic precomputations in differential and integral cryptanalysis
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Known and chosen key differential distinguishers for block ciphers
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
Linear cryptanalysis of ARIA block cipher
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
KFC - The Krazy Feistel Cipher
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Discrete logarithm variants of VSH
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
A weak key class of XTEA for a related-key rectangle attack
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
New applications of t-functions in block ciphers and hash functions
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Solving systems of differential equations of addition
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Near optimal algorithms for solving differential equations of addition with batch queries
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Block ciphers sensitive to gröbner basis attacks
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Pseudorandom permutation families over abelian groups
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Resynchronization attacks on WG and LEX
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Multimedia Tools and Applications
Refined analysis of bounds related to linear and differential cryptanalysis for the AES
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
New method for bounding the maximum differential probability for SPNs and ARIA
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
On constructing of a 32 ×32 binary matrix as a diffusion layer for a 256-bit block cipher
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
On the strength evaluation of lesamnta against differential cryptanalysis
ICSI'10 Proceedings of the First international conference on Advances in Swarm Intelligence - Volume Part II
Cryptographic analysis of all 4 × 4-bit s-boxes
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Combined differential and linear cryptanalysis of reduced-round PRINTcipher
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
The hummingbird-2 lightweight authenticated encryption algorithm
RFIDSec'11 Proceedings of the 7th international conference on RFID Security and Privacy
The initialization stage analysis of ZUC v1.5
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
On permutation layer of type 1, source-heavy, and target-heavy generalized feistel structures
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Impossible differential attacks on reduced-round LBlock
ISPEC'12 Proceedings of the 8th international conference on Information Security Practice and Experience
Anonymous channel and authentication in wireless communications
Computer Communications
Linear fault analysis of block ciphers
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
PICARO: a block cipher allowing efficient higher-order side-channel resistance
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Related-key rectangle attacks on reduced AES-192 and AES-256
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Cryptanalysis of TWIS block cipher
WEWoRC'11 Proceedings of the 4th Western European conference on Research in Cryptology
"Provable" security against differential and linear cryptanalysis
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
A methodology for differential-linear cryptanalysis and its applications
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Recursive diffusion layers for block ciphers and hash functions
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Differential propagation analysis of keccak
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Multiple differential cryptanalysis using LLR and χ2
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Differential analysis of the LED block cipher
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
CLIP: circuit level IC protection through direct injection of process variations
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
An analytical approach to s-box generation
Computers and Electrical Engineering
Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis
Proceedings of the 6th International Conference on Security of Information and Networks
Cryptanalysis of RC4(n, m) stream cipher
Proceedings of the 6th International Conference on Security of Information and Networks
Light-weight primitive, feather-weight security: a cryptanalytic knock-out
Proceedings of the Workshop on Embedded Systems Security
Block ciphers that are easier to mask: how far can we go?
CHES'13 Proceedings of the 15th international conference on Cryptographic Hardware and Embedded Systems
On using genetic algorithms for intrinsic side-channel resistance: the case of AES S-box
Proceedings of the First Workshop on Cryptography and Security in Computing Systems
On the algebraic construction of cryptographically good 32×32 binary linear transformations
Journal of Computational and Applied Mathematics
Differential entropy analysis of the IDEA block cipher
Journal of Computational and Applied Mathematics
Linear hulls with correlation zero and linear cryptanalysis of block ciphers
Designs, Codes and Cryptography
Hi-index | 0.06 |
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature. In this paper we develop a new type of cryptanalytic attack which can break DES with up to eight rounds in a few minutes on a PC and can break DES with up to 15 rounds faster than an exhaustive search. The new attack can be applied to a variety of DES-like substitution/permutation cryptosystems, and demonstrates the crucial role of the (unpublished) design rules.