scispace - formally typeset
Journal ArticleDOI

New types of cryptanalytic attacks using related keys

Eli Biham
- 01 Dec 1994 - 
- Vol. 7, Iss: 4, pp 229-246
Reads0
Chats0
TLDR
It is shown that the key-scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockcips, and that DES is not vulnerable to the related keys attacks.

Content maybe subject to copyright    Report

Citations
More filters
Journal Article

Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers

TL;DR: Chaskey as mentioned in this paper is a permutation-based MAC algorithm that uses the Addition-Rotation-XOR (ARX) design methodology for 32-bit microcontrollers.
Book ChapterDOI

Hummingbird: ultra-lightweight cryptography for resource-constrained devices

TL;DR: The experimental results show that after a system initialization phase Hummingbird can achieve up to 147 and 4.7 times faster throughput for a size-optimized and a speed- Optimized implementations, respectively, when compared to the state-of-the-art ultra-lightweight block cipher PRESENT on the similar platforms.
Journal ArticleDOI

Constructing Symmetric Ciphers Using the CAST Design Procedure

TL;DR: The CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems is described in this paper, which appears to have good resistance to differential cryptanalysis, linear cryptanalysis and related-key cryptanalysis.
Journal Article

A Practical Attack on KeeLoq

TL;DR: It is concluded that the practical key recovery attack against KeeLoq can be used to subvert the security of real systems and reveal the master secret used in an entire class of devices from attacking a single device.
Book ChapterDOI

Pseudorandom functions and permutations provably secure against related-key attacks

TL;DR: This paper fills an important foundational gap with the first proofs, under standard assumptions and in the standard model, of the existence of PRFs and PRPs resisting rich and relevant forms of related-key attack (RKA).
References
More filters
Journal ArticleDOI

Differential cryptanalysis of DES-like cryptosystems

TL;DR: A new type of cryptanalytic attack is developed which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variantof DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts.
Book

Cryptography and data security

TL;DR: The goal of this book is to introduce the mathematical principles of data security and to show how these principles apply to operating systems, database systems, and computer networks.
Journal Article

Data encryption standard

TL;DR: Presentation de la norme americaine de codage des donnees informatisees (DES: Data Encryption Standard) permet de proteger lesDonnees selon des criteres qui sont developpes dans ce texte.
Book

Differential Cryptanalysis of the Data Encryption Standard

TL;DR: This book introduces a new cryptographic method, called differential cryptanalysis, which can be applied to analyze cryptosystems, and describes the cryptanalysis of DES, deals with the influence of its building blocks on security, and analyzes modified variants.
Journal ArticleDOI

Cryptography and Computer Privacy

Horst Feistel
- 01 May 1973 -