How to Strengthen DES Using Existing Hardware

  title={How to Strengthen DES Using Existing Hardware},
  author={Eli Biham and Alex Biryukov},
requires more than trillion years on Wiener's machine 20]. Its main advantage is that organizations can increase the security of their systems which use DES in hardware, with the same encryption/decryption speed. An additional advantage is the backward compatibility to the standard DES, that can be achieved by choosing K a = K b = 0 and K c which does not modify the order of the S-boxes. Table 6 compares the security of the variants of our scheme and the standard DES. 
Highly Cited
This paper has 55 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 30 extracted citations

An investigation of an S-box mechanism in modern block cipher design

TENCON 2017 - 2017 IEEE Region 10 Conference • 2017
View 14 Excerpts
Highly Influenced

A fingerprint featured data encryption algorithm

2016 7th International Conference on Information and Communication Systems (ICICS) • 2016
View 4 Excerpts
Highly Influenced

Characteristics of Key-Dependent S-Boxes: the Case of Twofish

IACR Cryptology ePrint Archive • 2005
View 4 Excerpts
Highly Influenced

S-Box Modifications and Their Effect in DES-like Encryption Systems

Joe Gargiulo
View 4 Excerpts
Highly Influenced

Lightweight Cryptography - Cryptographic Engineering for a Pervasive World

IACR Cryptology ePrint Archive • 2009
View 9 Excerpts
Highly Influenced

How to Protect DES Against Exhaustive Key Search (an Analysis of DESX)

Journal of Cryptology • 2001
View 3 Excerpts
Highly Influenced

Fast Software Encryption

Lecture Notes in Computer Science • 1999
View 6 Excerpts
Highly Influenced

Fast software implementation of des for lightweight platforms

2017 International Artificial Intelligence and Data Processing Symposium (IDAP) • 2017
View 1 Excerpt

56 Citations

Citations per Year
Semantic Scholar estimates that this publication has 56 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.

Long Key Variants of DES

CRYPTO • 1982
View 1 Excerpt

Similar Papers

Loading similar papers…