Iterative Characteristics of DES and s²-DES

  • Authors:
  • Lars R. Knudsen

  • Affiliations:
  • -

  • Venue:
  • CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
  • Year:
  • 1992

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper we show that we are close at the proof that the type of characteristics used by Biham and Shamir in their differential attack on DES [3] are in fact the best characteristics we can find for DES. Furthermore we show that the criteria for the construction of DES-like S-boxes proposed by Kim [6] are insufficient to assure resistance against differential attacks. We show several good iterative characteristics for these S-boxes to be used in differential attacks. Finally we examine the probabilities of the two characteristics used by Biham and Shamir in [3], We found that for some keys we do not get the probabilities used in the attack. We suggest the use of 5 characteristics instead of two in the attack on DES.