Differential Cryptanalysis of the Data Encryption Standard

@inproceedings{Biham1993DifferentialCO,
  title={Differential Cryptanalysis of the Data Encryption Standard},
  author={E. Biham and A. Shamir},
  booktitle={Springer New York},
  year={1993}
}
  • E. Biham, A. Shamir
  • Published in Springer New York 1993
  • Mathematics, Computer Science
  • DES, the Data Encryption Standard, is one of several cryptographic standards. The authors of this text detail their cryptanalytic "attack" upon DES and several other systems, using creative and novel tactics to demonstrate how they broke DES up into 16 rounds of coding. The methodology used offers valuable insights to cryptographers and cryptanalysts alike in creating new encryption standards, strengthening current ones, and exploring new ways to test important data protection schemes. This… CONTINUE READING
    922 Citations
    An experiment on DES statistical cryptanalysis
    • 125
    Cryptanalysis of Block Ciphers: A Survey
    • 31
    • PDF
    Cryptanalysis of Block Ciphers
    • 31
    • PDF
    Variants of Differential and Linear Cryptanalysis
    • 8
    • PDF
    Enhancing Differential-Linear Cryptanalysis
    • 88
    • PDF
    Differential cryptanalysis of Lucifer
    • 12
    • PDF
    CAES Cryptosystem: Advanced Security Tests and Results
    • 2
    • PDF
    Differential Cryptanalysis of Lucifer
    • 42
    • PDF
    Techniques for Cryptanalysis of Block Ciphers
    • 4
    • PDF

    References

    SHOWING 1-10 OF 33 REFERENCES
    Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
    • 91
    • PDF
    A Statistical Attack of the FEAL-8 Cryptosystem
    • 27
    • PDF
    LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications
    • 128
    • Highly Influential
    Lucifer, a Cryptographic Algorithm
    • 75
    • Highly Influential
    Cryptography and Data Security
    • 1,908
    • Highly Influential
    Long Key Variants of DES
    • 13
    Cryptonalysis of the Data Encryption Standard by the Method of Formal Coding
    • 38
    • PDF
    Differential Cryptanalysis of Feal and N-Hash
    • 87
    • PDF
    A cryptanalytic time-memory trade-off
    • M. Hellman
    • Computer Science
    • IEEE Trans. Inf. Theory
    • 1980
    • 651
    • PDF
    Fast Software Encryption Functions
    • 118
    • Highly Influential
    • PDF