The security of DES-style block ciphers rests largely upon their nonlinear S-boxes. If different pairs of input data and key can produce identical inputs to all of a cipher's S-boxes, then for those pairs the system is weakened. A technique is described here which enables a cryptanalyst to find how many of these pairs, if any, exist for a given cryptosystem, and how to exploit those pairs under a chosen plaintext attack.
CITATION STYLE
Kwan, M., & Pieprzyk, J. (1993). A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 739 LNCS, pp. 237–246). Springer Verlag. https://doi.org/10.1007/3-540-57332-1_19
Mendeley helps you to discover research relevant for your work.