Abstract
The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key schedules, for example the slide attacks. In this paper we present new interesting key-pairs of the DES that can be used in related-key attacks to produce sliding properties of the full-round DES key schedule. This is a sort of key schedule weakness from a slide attack point of view. Our results demonstrate the first known sliding property of the original DES key schedule for its full 16 rounds. Finally, we consider potential applications of these findings in extending the slide attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, Vol.7, Springer-Verlag (1994) 229–246 138, 139, 147, 148
Biryukov, A., Wagner, D.: Slide Attacks. Proceedings of Fast Software Encryption’ 99, LNCS 1636, Springer-Verlag (1999) 245–259 138, 139, 141, 143, 147
Biryukov, A., Wagner, D.: Advanced Slide Attacks. Proceedings of Eurocrypt 2000, LNCS 1807, Springer-Verlag (2000) 589–606 138, 139, 142, 143, 147, 148
Brown, L., Seberry, J.: Key Scheduling in DES Type Cryptosystems. Proceedings of AUSCRYPT’90, LNCS 453, Springer-Verlag (1990) 221–228 148
Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. Proceedings of ICISC 2001, LNCS 2288, Springer-Verlag (2002) 214–225 147, 148
Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Proceedings of Crypto’96, LNCS 1109, Springer-Verlag (1996) 237–251 138, 147
Knudsen, L.R.: New Potentially ‘Weak’ Keys for DES and LOKI (Extended abstract). Proceedings of Eurocrypt’94, LNCS 950, Springer-Verlag (1994) 419–424 140
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Chung-Wei Phan, R., Furuya, S. (2003). Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_10
Download citation
DOI: https://doi.org/10.1007/3-540-36552-4_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00716-6
Online ISBN: 978-3-540-36552-5
eBook Packages: Springer Book Archive