How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (Q1853119)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. |
scientific article |
Statements
How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (English)
0 references
21 January 2003
0 references
In this paper we analyze the complexity of recovering cryptographic keys when messages are encrypted under various keys. We suggest key-collision attacks, which show that the theoretic strength of a block cipher (in ECB mode) cannot exceed the square root of the size of the key space. As a result, in some circumstances, some keys can be recovered while they are still in use, and these keys can then be used to substitute messages by messages more favorable to the attacker (e.g., transfer 1000000 to bank account 123-4567890). Taking DES as our example, we show that one key of DES can be recovered with complexity \(2^{28},\) and one 168-bit key of (three-key) triple-DES can be recovered with complexity \(2^{84}.\) We also discuss the theoretic strength of chaining modes of operation, and show that in some cases they may be vulnerable to such attacks.
0 references
Cryptanalysis
0 references
Data Encryption Standard (DES)
0 references
Triple-DES
0 references
Multiple-encryption
0 references
Birthday paradox
0 references
Key-collision attacks
0 references
Cryptography
0 references