NEW TYPES OF CRYPTANALYTIC ATTACKS USING RELATED KEYS

被引:47
作者
BIHAM, E
机构
关键词
KEY-SCHEDULING ALGORITHM; DES-LIKE CRYPTOSYSTEMS; CHOSEN KEY ATTACKS; CHOSEN PLAINTEXT ATTACKS; LOKI; DATA ENCRYPTION STANDARD;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we study the influence of key-scheduling algorithms on the strength of blockciphers. We show that the key-scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockciphers. Two new types of attacks are described: New chosen plaintext reductions of the complexity of exhaustive search attacks (and the faster variants based on complementation properties), and new low-complexity chosen key attacks. These attacks are independent of the number of rounds of the cryptosystems and of the details of the F-function and may have very small complexities. These attacks show that the key-scheduling algorithm should be carefully designed and that its structure should not be too simple. These attacks are applicable to both variants of LOKI and to Lucifer. DES is not vulnerable to the related keys attacks since the shift pattern in the key-scheduling algorithm is not the same in all the rounds.
引用
收藏
页码:229 / 246
页数:18
相关论文
共 17 条
[1]  
[Anonymous], 1977, FIPS PUBLICATION, V46
[2]  
BIHAM E, 1992, LECT NOTES COMPUT SC, V576, P156
[3]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[4]  
Biham E., 1993, DIFFERENTIAL CRYPTAN, DOI [10.1007/978-1-4613-9314-6, DOI 10.1007/978-1-4613-9314-6]
[5]  
BROWN L, 1990, LECT NOTES COMPUT SC, V453, P229
[6]  
BROWN L, 1990, LECT NOTES COMPUT SC, V453, P221
[7]  
BROWN L, 1993, ADV CRYPTOLOGY, V739, P36
[8]   CRYPTOGRAPHY AND COMPUTER PRIVACY [J].
FEISTEL, H .
SCIENTIFIC AMERICAN, 1973, 228 (05) :15-23
[9]  
HELLMAN ME, 1976, SEL76042 STANF U TEC
[10]  
KNUDSEN LR, 1993, LNCS, V718, P196