Advertisement

Differential Cryptanalysis of the Data Encryption Standard

  • Eli Biham
  • Adi Shamir

Table of contents

  1. Front Matter
    Pages i-ix
  2. Eli Biham, Adi Shamir
    Pages 1-6
  3. Eli Biham, Adi Shamir
    Pages 7-10
  4. Eli Biham, Adi Shamir
    Pages 11-32
  5. Eli Biham, Adi Shamir
    Pages 33-77
  6. Eli Biham, Adi Shamir
    Pages 79-88
  7. Eli Biham, Adi Shamir
    Pages 89-107
  8. Eli Biham, Adi Shamir
    Pages 109-131
  9. Eli Biham, Adi Shamir
    Pages 133-148
  10. Back Matter
    Pages 155-188

About this book

Introduction

DES, the Data Encryption Standard, is the best known and most widely used civilian cryptosystem. It was developed by IBM and adopted as a US national standard in the mid 1970`s, and had resisted all attacks in the last 15 years. This book presents the first successful attack which can break the full 16 round DES faster than via exhaustive search. It describes in full detail, the novel technique of Differential Cryptanalysis, and demonstrates its applicability to a wide variety of cryptosystems and hash functions, including FEAL, Khafre, REDOC-II, LOKI, Lucifer, Snefru, N-Hash, and many modified versions of DES. The methodology used offers valuable insights to anyone interested in data security and cryptography, and points out the intricacies of developing, evaluating, testing, and implementing such schemes. This book was written by two of the field`s leading researchers, and describes state-of-the-art research in a clear and completely contained manner.

Keywords

cryptoanalysis cryptography cryptosystem data encryption data security encryption hash function security

Authors and affiliations

  • Eli Biham
    • 1
  • Adi Shamir
    • 2
  1. 1.Computer Science DepartmentTechnion-Israel Institute of TechnologyHaifaIsrael
  2. 2.Department of Applied Mathematics and Computer ScienceThe Weizmann Institute of ScienceRehovotIsrael

Bibliographic information