Abstract
The standard technique to attack triple encryption is the meet-in-the-middle attack which requires 2112 encryption steps. In this paper, more efficient attacks are presented. One of our attacks reduces the overall number of steps to roughly 2108. Other attacks optimize the number of encryptions at the cost of increasing the number of other operations. It is possible to break triple DES doing 290 single encryptions and no more than 2113 faster operations.
A part of this research was done while the author was at the University of Göttingen.
Chapter PDF
Similar content being viewed by others
References
E. Biham, How to forge DES-Encrypted Messages in 228 steps, Technical report CS0884, Computer Science department, Technion, 1996, found in the www.
J. Kelsey, B. Schneier, D. Wagner, “Key-Schedule Cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES”, Crypto’ 96, Springer LNCS 1109, 237–251.
J. Kilian, P. Rogaway, How to protect DES against exhaustive key search, Crypto’ 96, Springer LNCS 1109, 252–267, full version found in the www.
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of applied cryptography, CRC Press, 1997.
R.C. Merkle, M.E. Hellman, On the security of multiple encryption Communications of the ACM, Vol. 24, No. 7 (1981).
P.C. van Oorschot, M.J. Wiener, A known-plaintext attack on two-key triple encryption, Eurocrypt’ 90, Springer LNCS 473, 318–325.
P.C. van Oorschot, M.J. Wiener, Improving implementable meet-in-the-middle attacks by orders of magnitude Crypto’ 96, Springer LNCS 1109, 229–236.
R.L. Rivest, A. Shamir, PayWord and MicroMint, two simple micropayment schemes, CryptoBytes, Vol. 2, No. 1 (1996), 7–11.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lucks, S. (1998). Attacking Triple Encryption. In: Vaudenay, S. (eds) Fast Software Encryption. FSE 1998. Lecture Notes in Computer Science, vol 1372. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-69710-1_16
Download citation
DOI: https://doi.org/10.1007/3-540-69710-1_16
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64265-7
Online ISBN: 978-3-540-69710-7
eBook Packages: Springer Book Archive