Analysis and design of stream ciphers
Analysis and design of stream ciphers
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
Linear cryptanalysis method for DES cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A proposed mode for triple-DES encryption
IBM Journal of Research and Development
An experiment on DES statistical cryptanalysis
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
On Weaknesses of Non–surjective Round Functions
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Resistance of a CAST-Like Encryption Algorithm to Linearand Differential Cryptanalysis
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Strength of two data encryption standard implementations under timing attacks
ACM Transactions on Information and System Security (TISSEC)
Logical Cryptanalysis as a SAT Problem
Journal of Automated Reasoning
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Slide Attacks with a Known-Plaintext Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Feistel Ciphers with L2-Decorrelation
SAC '98 Proceedings of the Selected Areas in Cryptography
Modeling Linear Characteristics of Substitution-Permutation Networks
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
On the Complexity of Matsui's Attack
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers
ECMAST '99 Proceedings of the 4th European Conference on Multimedia Applications, Services and Techniques
Differential-Linear Cryptanalysis
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
How to Protect DES Against Exhaustive Key Search
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
SOFSEM '98 Proceedings of the 25th Conference on Current Trends in Theory and Practice of Informatics: Theory and Practice of Informatics
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
On Bias Estimation in Linear Cryptanalysis
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Cryptographic Functions and Design Criteria for Block Ciphers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
On the Pseudorandomness of Top-Level Schemes of Block Ciphers
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Cryptographic Primitives for Information Authentication - State of the Art
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
An FPGA Implementation of the Linear Cryptanalysis
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
On the Design and Security of RC2
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Linear Cryptanalysis of RC5 and RC6
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Differential and Linear Cryptanalysis of a Reduced-Round SC2000
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds
ISC '01 Proceedings of the 4th International Conference on Information Security
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
A Chosen-Plaintext Linear Attack on DES
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis
IEEE Transactions on Computers
Battery power-aware encryption
ACM Transactions on Information and System Security (TISSEC)
Multidimensional Linear Cryptanalysis of Reduced Round Serpent
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
WSEAS Transactions on Computers
Provable security of block ciphers against linear cryptanalysis: a mission impossible?
Designs, Codes and Cryptography
Simulation study of the functioning of LFSR for grade 4 irreducible polynomials
SEPADS'09 Proceedings of the 8th WSEAS International Conference on Software engineering, parallel and distributed systems
Cryptanalysis of four-rounded DES using binary particleswarm optimization
Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers
Using Walk-SAT and Rel-SAT for cryptographic key search
IJCAI'99 Proceedings of the 16th international joint conference on Artifical intelligence - Volume 1
On Linear Cryptanalysis with Many Linear Approximations
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
On the security of two MAC algorithms
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Non-linear approximations in linear cryptanalysis
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
A generalization of linear cryptanalysis and the applicability of Matsui's piling-up lemma
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Software performance of universal hash functions
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Dial C for cipher: le chiffrement était presque parfait
SAC'06 Proceedings of the 13th international conference on Selected areas in cryptography
On the optimality of linear, differential, and sequential distinguishers
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On probability of success in linear and differential cryptanalysis
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Improving the time complexity of Matsui's linear cryptanalysis
ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
Cryptanalysis of two-round DES using genetic algorithms
ISICA'07 Proceedings of the 2nd international conference on Advances in computation and intelligence
Non-linear cryptanalysis revisited: heuristic search for approximations to S-boxes
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Linear cryptanalysis of non binary ciphers
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Application of data mining in cryptanalysis
ISCIT'09 Proceedings of the 9th international conference on Communications and information technologies
On multidimensional linear cryptanalysis
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
On unbiased linear approximations
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Accurate estimates of the data complexity and success probability for various cryptanalyses
Designs, Codes and Cryptography
Role of parasitic capacitors of MOS transistors in cryptographers
ICC'06 Proceedings of the 10th WSEAS international conference on Circuits
Improving the algorithm 2 in multidimensional linear cryptanalysis
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
KFC - The Krazy Feistel Cipher
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Searching for compact algorithms: CGEN
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
New attacks against reduced-round versions of IDEA
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
HIGHT: a new block cipher suitable for low-resource device
CHES'06 Proceedings of the 8th international conference on Cryptographic Hardware and Embedded Systems
Differential cryptanalysis of PP-1 cipher
Annales UMCS, Informatica - Cryptography and data protection
Cryptanalysis of four-rounded DES using binary artificial immune system
ICSI'10 Proceedings of the First international conference on Advances in Swarm Intelligence - Volume Part I
The cryptanalysis of the AES – a brief survey
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Proving the security of AES substitution-permutation network
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
An experimentally verified attack on full grain-128 using dedicated reconfigurable hardware
ASIACRYPT'11 Proceedings of the 17th international conference on The Theory and Application of Cryptology and Information Security
Linear cryptanalysis of PRINTcipher: trails and samples everywhere
INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
Towards parallel direct SAT-based cryptanalysis
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part I
Cryptanalysis of 256-bit key HyRAL via equivalent keys
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Correlation attacks on combination generators
Cryptography and Communications
Zero correlation linear cryptanalysis with reduced data complexity
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
A methodology for differential-linear cryptanalysis and its applications
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |
This paper describes an improved version of linear cryptanalysis and its application to the first, successful computer experiment in breaking the full 16-round DES. The scenario is a known-plaintext attack based on two new linear approximate equations, each of which provides candidates for 13 secret key bits with negligible memory. Moreover, reliability of the key candidates is taken into consideration, which increases the success rate. As a result, the full 16-round DES is breakable with high success probability if 243 random plaintexts and their ciphertexts are available. The author carried out the first experimental attack using twelve computers to confirm this: he finally reached all of the 56 secret, key bits in fifty days, out of which forty days were spent for generating plaintexts and their ciphertexts and only ten days were spent for the actual key search.