Lecture Notes in Computer Science
DOI: 10.1007/3-540-48329-2_17
|View full text |Cite
|
Sign up to set email alerts
|

Differential Cryptanalysis of Lucifer

Abstract: Differential cryptanalysis was introduced as an approach to analyze the security of DES-like cryptosystems. The first example of a DES-Like cryptosystem was Lucifer, the direct predecessor of DES, which is still believed by many people to be much more secure than DES, since it has 128 key bits, and since no attacks against (the full variant of) Lucifer were ever reported in the cryptographic literature. In this paper we introduce a new extension of differential cryptanalysis, devised to extend the class of vul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
26
0

Publication Types

Select...
5
2
2

Relationship

2
7

Authors

Journals

citations
Cited by 33 publications
(27 citation statements)
references
References 13 publications
1
26
0
Order By: Relevance
“…There are many modifications and extensions of the ideas presented in this paper. For example, cryptanalysis with impossible differentials can be used with low-probability (rather than zero-probability) differentials, can be used with conditional characteristics [2] (or differentials), and can be combined with linear [11] (rather than differential) cryptanalysis.…”
Section: Discussionmentioning
confidence: 99%
“…There are many modifications and extensions of the ideas presented in this paper. For example, cryptanalysis with impossible differentials can be used with low-probability (rather than zero-probability) differentials, can be used with conditional characteristics [2] (or differentials), and can be combined with linear [11] (rather than differential) cryptanalysis.…”
Section: Discussionmentioning
confidence: 99%
“…The attacks are made more successful and accurate by more trial, Comprehensive enumeration is done to discover the rest of the key bits. Relationship difference between the input & output of the function blocks are exploited by the differential cryptanalysis [2]. For an algorithm with encryption, plaintext pattern that have fixed difference are inspected.…”
Section: Present Research Efforts a Pre-existing Attackmentioning
confidence: 99%
“…Bard and Courtois [22] described one more hybrid-attack on DES, which was the combination of SAT-Solver with the algebraic attack. The DES S-boxes were represented by them as a nearly-linear, sparse, and large system of equation in GF (2). ("Nearly-linear" depicts maximum of 1 nonlinear term in all equations.)…”
Section: B Algebraic Attackmentioning
confidence: 99%
“…In general we call these conditional characteristics (cf. the attack on Lucifer [1]), which have a certain probability with respect to a subset of the key space. Their usage is advisable when they improve the probability over the best probability of a nonconditional characteristic by a factor higher than the inverse of the key fraction (the ratio between the size of the subset and the size of the key space), especially if several such characteristics can efficiently share the same structure of chosen plaintexts.…”
Section: Differential Characteristics For Icementioning
confidence: 99%