Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard

@article{Diffie1977SpecialFE,
  title={Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard},
  author={Whitfield Diffie and Martin E. Hellman},
  journal={Computer},
  year={1977},
  volume={10},
  pages={74-84}
}
For centuries, cryptography has been a valuable asset of the military and diplomatic communities. Indeed, it is so valuable that its practice has usually been shrouded in secrecy and mystery. 

Figures and Tables from this paper

Analytical Characteristics of the DES
The necessity to use cryptography in order to protect stored and transmitted data has been recognized in many commercial applications, such as electronic funds transfer (EFT), automated
Cryptography and Crypto-Systems
In this section we shall describe what modern cryptographic methods are expected to achieve - the criteria of security they have to meet. It would be convenient if there were proofs of the security
Data security: a cryptographic approach
  • A. RainaS. Kak
  • Computer Science, Mathematics
    Proceedings of the Indian Academy of Sciences Section C: Engineering Sciences
  • 1982
This paper is a review of the subject of data security. The probabilistic as well as the computational complexity approaches to this subject have been discussed. Ciphers examined in some depth
Contemporary evolution in cryptographic techniques
The authors discuss the ground rules of cryptographic systems and show how they are evolving to protect information from the 'computer burglar'. The legal and commercial framework surrounding the
A Security Analysis Of The Federal Data Encryption Standard
Modifications increasing the cryptanalysis resitance of the National Bureau of Standards developed Federal Data Encryption Standard are discussed.
Contemporary Block Ciphers
  • L. Knudsen
  • Computer Science, Mathematics
    Lectures on Data Security
  • 1998
TLDR
The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outlined.
A successful attack against the DES
It is shown that the Data Encryption Standard (DES) function is divided into 68 subfunctions, and therefore the exhaustive key search attack could be done by a pipelining method. A chip is designed
Is the Data Encryption Standard a Group? (Preliminary Abstract)
TLDR
The Data Encryption Standard (DES) defines an indexed set of permutations acting on the message space M = {0,1}64, which would be vulnerable to a known-plaintext attack that runs in 228 steps, on the average.
Hash Functions and Gröbner Bases Cryptanalysis
Hash functions are being used as building blocks in such diverse primitives as commitment schemes, message authentication codes and digital signatures. These primitives have important applications ...
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis
TLDR
This extended abstract briefly summarizes a talk with the same title and gives literature pointers and coin the term bruteforce-like cryptanalysis, which is coined in this paper.
...
...

References

SHOWING 1-10 OF 17 REFERENCES
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard
The National Bureau of Standards (NBS) has implemented a Data Encryption Standard (DES), describing an encryption procedure to be used by Federal agencies and others to protect data against
Communication theory of secrecy systems
  • C. Shannon
  • Computer Science, Mathematics
    Bell Syst. Tech. J.
  • 1949
TLDR
A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.
An extension of the Shannon theory approach to cryptography
  • M. Hellman
  • Computer Science
    IEEE Trans. Inf. Theory
  • 1977
Shannon's information-theoretic approach to cryptography is reviewed and extended. It is shown that Shannon's random cipher model is conservative in that a randomly chosen cipher is essentially the
A note on Wyner's wiretap channel (Corresp.)
TLDR
It is shown that it is possible to send at capacity on the main link and still keep the wiretapper's information equal to zero on many, large, arbitrary portions of the message.
Physical limits in digital electronics
  • R. Keyes
  • Physics
    Proceedings of the IEEE
  • 1975
Miniaturization has steadily increased the economic usefulness of digital electronics through the past two decades. A variety of physical arguments are brought to bear on the question of how far
The Federal Register.
  • G. Leopold
  • Computer Science
    Journal of clinical ultrasound : JCU
  • 1979
TLDR
This final rule allows the use of portable fire extinguishers in working sections of underground anthracite coal mines that have no electrical equipment at the working section and produce less than 300 tons of coal per shift.
The Role of Technology in Microcomputer Design and Evolution
  • IEEE Trans. on Circuits and Systems
  • 1975
NBS), letter to M. Hellman dated January 6
  • NBS), letter to M. Hellman dated January 6
  • 1976
...
...