A cryptanalysis procedure of the data encryption standard

Research output: Contribution to journalConference articlepeer-review

Abstract

In this paper an attack strategy on the Data Encryption Standard (DES) that is different from the existing ones is developed. The attack strategy is based on a theorem proved by the author, called LR theorem. The attack can be done by means of a personal computer, i.e. a Pentium IV based machine. Obviously, more information than a sample of plaintext and ciphertext is required. However, this additional requirement is reduced to a minimum of just 24 bits. The LR theorem uncovers 16 trapdoors of which 2 are of importance. With this knowledge, an attack on Triple-DES can be performed using the aforementioned personal computer. A simple solution to this kind of attack is proposed, preserving the complexity of the Triple-DBS, 2112.

Original languageEnglish
Article number591504
Pages (from-to)1-7
Number of pages7
JournalProceedings of SPIE - The International Society for Optical Engineering
Volume5915
DOIs
StatePublished - 2005
EventMathematics of Data/Image Coding, Compression, and Encryption VIII, with Applications - San Diego, CA, United States
Duration: 1 Aug 20053 Aug 2005

Keywords

  • Algorithm
  • Attack
  • Cryptanalysis
  • DES
  • Data encryption standard
  • LR Theorem
  • Pentium IV
  • Triple DES

Fingerprint

Dive into the research topics of 'A cryptanalysis procedure of the data encryption standard'. Together they form a unique fingerprint.

Cite this