Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks

  • Raphael Chung-Wei Phan
  • Soichi Furuya
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2587)


The DES key schedule is linear and yet defeats related-key cryptanalysis and other attacks that exploit weaknesses in key schedules, for example the slide attacks. In this paper we present new interesting key-pairs of the DES that can be used in related-key attacks to produce sliding properties of the full-round DES key schedule. This is a sort of key schedule weakness from a slide attack point of view. Our results demonstrate the first known sliding property of the original DES key schedule for its full 16 rounds. Finally, we consider potential applications of these findings in extending the slide attacks.


Block ciphers cryptanalysis DES key schedule extended slide attacks sliding property 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Biham, E.: New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, Vol.7, Springer-Verlag (1994) 229–246 138, 139, 147, 148MATHCrossRefGoogle Scholar
  2. [2]
    Biryukov, A., Wagner, D.: Slide Attacks. Proceedings of Fast Software Encryption’ 99, LNCS 1636, Springer-Verlag (1999) 245–259 138, 139, 141, 143, 147Google Scholar
  3. [3]
    Biryukov, A., Wagner, D.: Advanced Slide Attacks. Proceedings of Eurocrypt 2000, LNCS 1807, Springer-Verlag (2000) 589–606 138, 139, 142, 143, 147, 148Google Scholar
  4. [4]
    Brown, L., Seberry, J.: Key Scheduling in DES Type Cryptosystems. Proceedings of AUSCRYPT’90, LNCS 453, Springer-Verlag (1990) 221–228 148Google Scholar
  5. [5]
    Furuya, S.: Slide Attacks with a Known-Plaintext Cryptanalysis. Proceedings of ICISC 2001, LNCS 2288, Springer-Verlag (2002) 214–225 147, 148Google Scholar
  6. [6]
    Kelsey, J., Schneier, B., Wagner, D.: Key-Schedule Cryptanalysis of IDEA, GDES, GOST, SAFER, and Triple-DES. Proceedings of Crypto’96, LNCS 1109, Springer-Verlag (1996) 237–251 138, 147Google Scholar
  7. [7]
    Knudsen, L.R.: New Potentially ‘Weak’ Keys for DES and LOKI (Extended abstract). Proceedings of Eurocrypt’94, LNCS 950, Springer-Verlag (1994) 419–424 140Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Raphael Chung-Wei Phan
    • 1
  • Soichi Furuya
    • 2
  1. 1.Swinburne Sarawak Institute of TechnologyKuchingMalaysia
  2. 2.Systems Development LabHitachi, Ltd.Japan

Personalised recommendations