Skip to main content

Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2002 (ICISC 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Included in the following conference series:

Abstract

The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key schedules, for example the slide attacks. In this paper we present new interesting key-pairs of the DES that can be used in related-key attacks to produce sliding properties of the full-round DES key schedule. This is a sort of key schedule weakness from a slide attack point of view. Our results demonstrate the first known sliding property of the original DES key schedule for its full 16 rounds. Finally, we consider potential applications of these findings in extending the slide attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, Vol.7, Springer-Verlag (1994) 229–246 138, 139, 147, 148

    Article  MATH  Google Scholar 

  2. Biryukov, A., Wagner, D.: Slide Attacks. Proceedings of Fast Software Encryption’ 99, LNCS 1636, Springer-Verlag (1999) 245–259 138, 139, 141, 143, 147

    Google Scholar 

  3. Biryukov, A., Wagner, D.: Advanced Slide Attacks. Proceedings of Eurocrypt 2000, LNCS 1807, Springer-Verlag (2000) 589–606 138, 139, 142, 143, 147, 148

    Google Scholar 

  4. Brown, L., Seberry, J.: Key Scheduling in DES Type Cryptosystems. Proceedings of AUSCRYPT’90, LNCS 453, Springer-Verlag (1990) 221–228 148

    Google Scholar 

  5. Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. Proceedings of ICISC 2001, LNCS 2288, Springer-Verlag (2002) 214–225 147, 148

    Google Scholar 

  6. Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Proceedings of Crypto’96, LNCS 1109, Springer-Verlag (1996) 237–251 138, 147

    Google Scholar 

  7. Knudsen, L.R.: New Potentially ‘Weak’ Keys for DES and LOKI (Extended abstract). Proceedings of Eurocrypt’94, LNCS 950, Springer-Verlag (1994) 419–424 140

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chung-Wei Phan, R., Furuya, S. (2003). Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics