How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (Q1853119)

From MaRDI portal
scientific article
Language Label Description Also known as
English
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
scientific article

    Statements

    How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (English)
    0 references
    0 references
    21 January 2003
    0 references
    In this paper we analyze the complexity of recovering cryptographic keys when messages are encrypted under various keys. We suggest key-collision attacks, which show that the theoretic strength of a block cipher (in ECB mode) cannot exceed the square root of the size of the key space. As a result, in some circumstances, some keys can be recovered while they are still in use, and these keys can then be used to substitute messages by messages more favorable to the attacker (e.g., transfer 1000000 to bank account 123-4567890). Taking DES as our example, we show that one key of DES can be recovered with complexity \(2^{28},\) and one 168-bit key of (three-key) triple-DES can be recovered with complexity \(2^{84}.\) We also discuss the theoretic strength of chaining modes of operation, and show that in some cases they may be vulnerable to such attacks.
    0 references
    Cryptanalysis
    0 references
    Data Encryption Standard (DES)
    0 references
    Triple-DES
    0 references
    Multiple-encryption
    0 references
    Birthday paradox
    0 references
    Key-collision attacks
    0 references
    Cryptography
    0 references

    Identifiers