Cryptanalysis of DES with a reduced number of rounds
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
The Data Encryption Standard (DES) and its strength against attacks
IBM Journal of Research and Development
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
The design of substitution-permutation networks resistant to differential and linear cryptanalysis
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
An experiment on DES statistical cryptanalysis
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
IEEE Transactions on Computers
Examining Smart-Card Security under the Threat of Power Analysis Attacks
IEEE Transactions on Computers
A Survey of Encryption Standards
IEEE Micro
Avalanche Characteristics of Substitution-Permutation Encryption Networks
IEEE Transactions on Computers
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
A High-Speed DES Implementation for Network Applications
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Differential Attack on Message Authentication Codes
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Differential and Linear Cryptanalysis of a Reduced-Round SC2000
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds
ISC '01 Proceedings of the 4th International Conference on Information Security
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Selecting the Advanced Encryption Standard
IEEE Security and Privacy
A novel encryption algorithm for high resolution video
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
Proceedings of the conference on Design, automation and test in Europe: Designers' forum
Problem areas for the IP security protocols
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
Adaptive loops with kaapi on multicore and grid: applications in symmetric cryptography
Proceedings of the 2007 international workshop on Parallel symbolic computation
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
Aiding side-channel attacks on cryptographic software with satisfiability-based analysis
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Prevention of Information Leakage by Photo-Coupling in Smart Card
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
MIBS: A New Lightweight Block Cipher
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Differential analysis of GOST encryption algorithm
Proceedings of the 3rd international conference on Security of information and networks
Algebraic cryptanalysis of curry and flurry using correlated messages
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
Accurate estimates of the data complexity and success probability for various cryptanalyses
Designs, Codes and Cryptography
Search for related-key differential characteristics in DES-like ciphers
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Algebraic techniques in differential cryptanalysis revisited
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
Privacy-preserving outsourcing of brute-force key searches
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
International Journal of Applied Mathematics and Computer Science
First differential attack on full 32-round GOST
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Puzzle: a novel video encryption algorithm
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
New improvements of davies-murphy cryptanalysis
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Integrating grid with cryptographic computing
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Side channel cryptanalysis on SEED
WISA'04 Proceedings of the 5th international conference on Information Security Applications
On boolean functions with generalized cryptographic properties
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Related-Key attacks on reduced rounds of SHACAL-2
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
High diffusion cipher: encryption and error correction in a single cryptographic primitive
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Proving the security of AES substitution-permutation network
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Group signature with constant revocation costs for signers and verifiers
CANS'11 Proceedings of the 10th international conference on Cryptology and Network Security
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
A methodology for differential-linear cryptanalysis and its applications
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Neuro-Cryptanalysis of DES and Triple-DES
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Randomized symmetric block encryption
Proceedings of the First International Conference on Security of Internet of Things
Square reflection cryptanalysis of 5-round Feistel networks with permutations
Information Processing Letters
Differential attack on nine rounds of the SEED block cipher
Information Processing Letters
Hi-index | 0.01 |
In this paper we develop the first known attack which is capable of breaking the full 16 round DES in less than the 255 complexity of exhaustive search. The data analysis phase computes the key by analyzing about 236 ciphertexts in 237 time. The 236 usable ciphertexts are obtained during the data collection phase from a larger pool of 247 chosen plaintexts by a simple bit repetition criteria which discards more than 99.9% of the ciphertexts as soon as they are generated. While earlier versions of differential attacks were based on huge counter arrays, the new attack requires negligible memory and can be carried out in parallel on up to 233 disconnected processors with linear speedup. In addition, the new attack can be carried out even if the analyzed ciphertexts are derived from up to 233 different keys due to frequent key changes during the data collection phase. The attack can be carried out incrementally with any number of available ciphertexts, and its probability of success grows linearly with this number (e.g., when 229 usable ciphertexts are generated from a smaller pool of 240 plaintexts, the analysis time decreases to 230 and the probability of success is about 1%).