Cryptanalysis of multiple modes of operation
- Eli Biham
- … show all 1 hide
In recent years, several new attacks on DES were introduced. These attacks have led researchers to suggest stronger replacements for DES, and in particular new modes of operation for DES. The most popular new modes are triple DES variants, which are claimed to be as secure as triple DES. To speed up hardware implementations of these modes, and to increase the avalanche, many suggestions apply several standard modes sequentially. In this paper we study these multiple (cascade) modes of operation. This study shows that many multiple modes are much weaker than multiple DES, and their strength is comparable to a single DES.
We conjecture that operation modes should be designed around an underlying cryptosystem without any attempt to use intermediate data as feedback, or to mix the feedback into an intermediate round. Thus, in particular, triple DES used in CBC mode is more secure than three single DES's used in triple CBC mode. Alternatively, if several encryptions are applied to each block, the best choice is to concatenate them to one long encryption, and build the mode of operation around it.
- Eli Biham, On Matsui's Linear Cryptanalysis, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'94, to appear.
- Eli Biham, Alex Biryukov, An Improvement of Davies' Attack on DES, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'94, to appear.
- Eli Biham, Adi Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
- Eli Biham, Adi Shamir, Differential Cryptanalysis of the full 16-round DES, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO'92, pp. 487–496, 1992.
- D. W. Davies, Investigation of a Potential Weakness in the DES Algorithm, 1987, private communication.
- Carl Ellison, private communications, 1993.
- Even, S., Goldreich, O. (1985) On the Power of Cascade Ciphers. ACM Transactions on Computer Systems 3: pp. 108-116
- Burt Kaliski, Triple-DES: A Brief Report, RSA laboratories, private communication, October 29, 1993.
- Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'93, pp. 386–397, 1993.
- Maurer, U. M., Massey, J. L. (1993) Cascade Ciphers: The Importance of Being First. Journal of Cryptology 6: pp. 55-61
- Miyaguchi, S., Shiraishi, A., Shimizu, A. (1988) Fast Data Encryption Algorithm FEAL-8. Review of electrical communications laboratories 36: pp. 433-437
- National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.
- National Bureau of Standards, DES Modes of Operation, U.S. Department of Commerce, FIPS pub. 81, December 1980.
- Paul C. van Oorschot, Michael J. Wiener, A Known Plaintext Attack on Two-Key Triple Encryption, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'90, pp. 318–325, 1990.
- Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan Buelens, Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO'93, pp. 212–223, 1993.
- Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm FEAL, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT'87, pp. 267–278, 1987.
- Wiener, M. J. (1993) Efficient DES Key Search. technical report TR-244. School of Computer Science, Carleton University, Ottawa, Canada
- Cryptanalysis of multiple modes of operation
- Book Title
- Advances in Cryptology — ASIACRYPT'94
- Book Subtitle
- 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 – December 1, 1994 Proceedings
- pp 278-292
- Print ISBN
- Online ISBN
- Series Title
- Lecture Notes in Computer Science
- Series Volume
- Series ISSN
- Springer Berlin Heidelberg
- Copyright Holder
- Additional Links
- Industry Sectors
- eBook Packages
To view the rest of this content please follow the download PDF link above.