# Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard

@article{Diffie1977SpecialFE, title={Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard}, author={Whitfield Diffie and Martin E. Hellman}, journal={Computer}, year={1977}, volume={10}, pages={74-84} }

For centuries, cryptography has been a valuable asset of the military and diplomatic communities. Indeed, it is so valuable that its practice has usually been shrouded in secrecy and mystery.

## 449 Citations

Analytical Characteristics of the DES

- Computer ScienceCRYPTO
- 1983

The necessity to use cryptography in order to protect stored and transmitted data has been recognized in many commercial applications, such as electronic funds transfer (EFT), automated…

Cryptography and Crypto-Systems

- Computer Science, Mathematics
- 1979

In this section we shall describe what modern cryptographic methods are expected to achieve - the criteria of security they have to meet. It would be convenient if there were proofs of the security…

Data security: a cryptographic approach

- Computer Science, MathematicsProceedings of the Indian Academy of Sciences Section C: Engineering Sciences
- 1982

This paper is a review of the subject of data security. The probabilistic as well as the computational complexity approaches to this subject have been discussed. Ciphers examined in some depth…

Contemporary evolution in cryptographic techniques

- Computer Science, Mathematics
- 1984

The authors discuss the ground rules of cryptographic systems and show how they are evolving to protect information from the 'computer burglar'. The legal and commercial framework surrounding the…

A Security Analysis Of The Federal Data Encryption Standard

- Computer Science
- 1977

Modifications increasing the cryptanalysis resitance of the National Bureau of Standards developed Federal Data Encryption Standard are discussed.

Contemporary Block Ciphers

- Computer Science, MathematicsLectures on Data Security
- 1998

The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outlined.

A successful attack against the DES

- Computer ScienceInformation Theory and Applications
- 1993

It is shown that the Data Encryption Standard (DES) function is divided into 68 subfunctions, and therefore the exhaustive key search attack could be done by a pipelining method. A chip is designed…

Is the Data Encryption Standard a Group? (Preliminary Abstract)

- Computer Science, MathematicsEUROCRYPT
- 1985

The Data Encryption Standard (DES) defines an indexed set of permutations acting on the message space M = {0,1}64, which would be vulnerable to a known-plaintext attack that runs in 228 steps, on the average.

Hash Functions and Gröbner Bases Cryptanalysis

- Computer Science, Mathematics
- 2012

Hash functions are being used as building blocks in such diverse primitives as commitment schemes, message authentication codes and digital signatures. These primitives have important applications ...

On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis

- Mathematics, Computer ScienceICISC
- 2012

This extended abstract briefly summarizes a talk with the same title and gives literature pointers and coin the term bruteforce-like cryptanalysis, which is coined in this paper.

## References

SHOWING 1-10 OF 17 REFERENCES

New directions in cryptography

- Computer Science, MathematicsIEEE Trans. Inf. Theory
- 1976

This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.

Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard

- Computer ScienceCryptologia
- 1977

The National Bureau of Standards (NBS) has implemented a Data Encryption Standard (DES), describing an encryption procedure to be used by Federal agencies and others to protect data against…

Communication theory of secrecy systems

- Computer Science, MathematicsBell Syst. Tech. J.
- 1949

A theory of secrecy systems is developed on a theoretical level and is intended to complement the treatment found in standard works on cryptography.

An extension of the Shannon theory approach to cryptography

- Computer ScienceIEEE Trans. Inf. Theory
- 1977

Shannon's information-theoretic approach to cryptography is reviewed and extended. It is shown that Shannon's random cipher model is conservative in that a randomly chosen cipher is essentially the…

A note on Wyner's wiretap channel (Corresp.)

- Computer ScienceIEEE Trans. Inf. Theory
- 1977

It is shown that it is possible to send at capacity on the main link and still keep the wiretapper's information equal to zero on many, large, arbitrary portions of the message.

Physical limits in digital electronics

- PhysicsProceedings of the IEEE
- 1975

Miniaturization has steadily increased the economic usefulness of digital electronics through the past two decades. A variety of physical arguments are brought to bear on the question of how far…

The Federal Register.

- Computer ScienceJournal of clinical ultrasound : JCU
- 1979

This final rule allows the use of portable fire extinguishers in working sections of underground anthracite coal mines that have no electrical equipment at the working section and produce less than 300 tons of coal per shift.

The Role of Technology in Microcomputer Design and Evolution

- IEEE Trans. on Circuits and Systems
- 1975

NBS), letter to M. Hellman dated January 6

- NBS), letter to M. Hellman dated January 6
- 1976