In this paper we improve Davies' attack [2] on DES to become capable of breaking the full 16-round DES faster than the exhaustive search. Our attack requires 250 known plaintexts and 250 complexity of analysis. If independent subkeys are used, a variant of this attack can find 26 bits out of the 768 key bits using 252 known plaintexts. All the 768 bits of the subkeys can be found using 260 known plaintexts. The data analysis requires only several minutes on àSPARC workstation. Therefore, this is the third successful attack on DES, faster than brute force, after differential cryptanalysis [1] and linear cryptanalysis [5]. We also suggest criteria which make the S-boxes immune to this attack. © 1997 International Association for Cryptologic Research.
CITATION STYLE
Biham, E., & Biryukov, A. (1997). An improvement of davies’ attack on des. Journal of Cryptology, 10(3), 195–205. https://doi.org/10.1007/s001459900027
Mendeley helps you to discover research relevant for your work.