Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks
- First Online:
The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key schedules, for example the slide attacks. In this paper we present new interesting key-pairs of the DES that can be used in related-key attacks to produce sliding properties of the full-round DES key schedule. This is a sort of key schedule weakness from a slide attack point of view. Our results demonstrate the first known sliding property of the original DES key schedule for its full 16 rounds. Finally, we consider potential applications of these findings in extending the slide attacks.
KeywordsBlock ciphers cryptanalysis DES key schedule extended slide attacks sliding property
Unable to display preview. Download preview PDF.
- Biryukov, A., Wagner, D.: Slide Attacks. Proceedings of Fast Software Encryption’ 99, LNCS 1636, Springer-Verlag (1999) 245–259 138, 139, 141, 143, 147Google Scholar
- Biryukov, A., Wagner, D.: Advanced Slide Attacks. Proceedings of Eurocrypt 2000, LNCS 1807, Springer-Verlag (2000) 589–606 138, 139, 142, 143, 147, 148Google Scholar
- Brown, L., Seberry, J.: Key Scheduling in DES Type Cryptosystems. Proceedings of AUSCRYPT’90, LNCS 453, Springer-Verlag (1990) 221–228 148Google Scholar
- Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. Proceedings of ICISC 2001, LNCS 2288, Springer-Verlag (2002) 214–225 147, 148Google Scholar
- Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Proceedings of Crypto’96, LNCS 1109, Springer-Verlag (1996) 237–251 138, 147Google Scholar
- Knudsen, L.R.: New Potentially ‘Weak’ Keys for DES and LOKI (Extended abstract). Proceedings of Eurocrypt’94, LNCS 950, Springer-Verlag (1994) 419–424 140Google Scholar