Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications)
スポンサーリンク
概要
- 論文の詳細を見る
This paper proposes a dynamically randomized version of DES (called RDES) in which a input-dependent swapping S_k(X) is added onto the right half of the input in each round of DES. This new scheme decreases the probability of success in differential cryptanalysis because it decreases the characteristic probability. Each "best" two-round characteristic probability is analyzed for typical schemes of the RDES: (i) RDES-1 with a simple one-level swapping, (ii) RDES-1' with an optimal one-level swapping, (iii) RDES-2 with a simple two-level swapping, and (iv) RDES-2' with an optimal two-level swapping. The main results are as follows. (a) The differential attacks on the 16-round RDES-1' and the 16-round RDES-2 require more computational time than the exhaustive search. (b) A differential attack is substantially inapplicable to the 16-round RDES-2' because more than 2^<63> chosen plaintext pairs are required. (c) The encryption/decryption speed of the n-round RDES is almost the same as that of the n-round DES.
- 社団法人電子情報通信学会の論文
- 1994-08-25
著者
-
Kaneko Toshinobu
Science University of Tokyo
-
KOYAMA Kenji
NTT Communication Science Laboratories
-
TERADA Routo
Dept. of Computer Science, University of Sao Paulo
-
Terada R
The Author Is With University Of Sao Paulo
-
Kaneko T
Sci. Univ. Tokyo Chiba Jpn
-
Kaneko T
Tokyo Univ. Sci. Noda‐shi Jpn
-
Koyama K
Graduate School Of Engineering Shizuoka University
関連論文
- Linear Cryptanalysis by Linear Sieve Method (Special Section on Cryptography and Information Security)
- FOREWORD (Special Section on Cryptography and Information Security)
- The Security of an RDES Cryptosystem against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- A MAC Forgery Attack on SOBER-128(Discrete Mathematics and Its Applications)
- Special Section on Cryptography and Information Security
- Evaluation of Performance of TCP on Mobile IP SHAKE(Selected Papers from ICMU 2004(First International Conference on Mobile Computing and Ubiquitous Networking))
- Demonstrating Possession without Revealing Factors (Special Section on Cryptography and Information Security)
- Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications(Special Section on Cryptography and Information Security)
- Cryptographic Works of Dr. Kenji Koyama: In Memoria : Special Section on Cryptography and Information Security
- Efficient Cryptosystems over Elliptic Curves Based on a Product of Form-Free Primes (Special Section on Information Theory and Its Applications)
- A New RSA-Type Scheme Based on Singular Cubic Curves y^2≡x^3+bx^2 (mod n)
- Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- A New Version of FEAL, Stronger against Differential Cryptanalysis (Special Section on Cryptography and Information Security)
- A New RSA-Type Scheme Based on Singular Cubic Curves (y-αx)(y-βx )≡x^3 (mod n) (Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Fast Exponentiation Algorithms Based on Batch-Processing and Precomputation (Special Section on Cryptography and Information Security)
- A Signed Binary Window Method for Fast Computing over Elliptic Curves (Special Section on Cryptography and Information Security)
- Elliptic Curve Cryptosystems and Their Applications
- Diffretial Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds(Special Section on Fundamentals of Information and Communications)
- On the Solutions of the Diophantine Equation x^3+y^3+z^3=n
- How to Strengthen DES-like Cryptosystems against Differential Cryptanalysis (Special Section on Cryptography and Information Security)
- Improved Elliptic Curve Methods for Factoring and Their Performance (Special Section on Cryptography and Information Security)