Abstract
It is a general belief among the designers of block-ciphers that even a relatively weak cipher may become very strong if its number of rounds is made very large. In this paper we describe a new generic known- (or sometimes chosen-) plaintext attack on product ciphers, which we call the slide attack and which in many cases is independent of the number of rounds of a cipher. We illustrate the power of this new tool by giving practical attacks on several recently designed ciphers: TREYFER, WAKE-ROFB, and variants of DES and Blowfish.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
E. Biham, New Types of Cryptanalytic Attacks Using Related Keys, J. of Cryptology, Vol.7, pp.229–246, 1994.
E. Biham, A. Biryukov, N. Ferguson, L. R. Knudsen, B. Schneier, A. Shamir, Cryptanalysis of Magenta, Second AES Conference, 1999.
A. Biryukov, E. Kushilevitz, From differential cryptanalysis to ciphertext-only attacks, LNCS 1462, Advances in Cryptology CRYPTO’98, pp.72–88, Springer-Verlag, 1998.
C. Clapp, Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors, LNCS 1267, FSE’97 Proceedings, pp.273–287, Springer-Verlag, 1997.
C. Clapp, Joint Hardware / Software Design of a Fast Stream Cipher, LNCS 1373, FSE’98 Proceedings, pp.75–92, Springer-Verlag, 1998.
C. Clapp, WAKE UPdate, FSE’99 rump session, 1999.
J. Daemen, R. Govaerts, J. Vanderwalle, Re-synchronization weaknesses in stream ciphers, LNCS 765, Advances in Cryptology EUROCRYPT’93, pp.159–169, Springer-Verlag, 1994.
E. K. Grossman, B. Tuckerman, Analysis of a Weakened Feistel-like Cipher, 1978 International Conference on Communications, pp.46.3.1–46.3.5, Alger Press Limited, 1978.
G. Yuval, Reinventing the Travois: Encryption/MAC in 30 ROM Bytes, LNCS 1267, FSE’97 Proceedings, pp.205–209, Springer-Verlag, 1997.
G. Yuval, Private communication, August 1998.
L. R. Knudsen, Cryptanalysis of LOKI91, LNCS 718, Advances in Cryptology AUSCRYPT’92, pp.196–208, Springer-Verlag, 1993.
M. Matsui, Linear Cryptanalysis Method of DES Cipher, LNCS 765, Advances in Cryptology EUROCRYPT’93, pp.386–397, Springer-Verlag, 1994.
B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), LNCS 809, FSE’94 Proceedings, pp.191–204, Springer-Verlag, 1994.
S. Vaudenay, On the Weak Keys in Blowfish, LNCS 1039, FSE’96 Proceedings, pp.27–32, Springer-Verlag, 1996.
D. Wagner, Cryptanalysis of some recently-proposed multiple modes of operation, LNCS 1373, FSE’98 Proceedings, pp.254–269, Springer-Verlag, 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biryukov, A., Wagner, D. (1999). Slide Attacks. In: Knudsen, L. (eds) Fast Software Encryption. FSE 1999. Lecture Notes in Computer Science, vol 1636. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48519-8_18
Download citation
DOI: https://doi.org/10.1007/3-540-48519-8_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66226-6
Online ISBN: 978-3-540-48519-3
eBook Packages: Springer Book Archive