Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-77026-8_8
|View full text |Cite
|
Sign up to set email alerts
|

Improved Meet-in-the-Middle Attacks on Reduced-Round DES

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
25
0

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 38 publications
(26 citation statements)
references
References 12 publications
1
25
0
Order By: Relevance
“…A future possible line of work is to investigate some possible combinations with other existing MITM improvements: with the guess of intermediate state bits [21], or with the all-subkeys approach [24]. A promising direction would be to try to make a first selection within each of the two lists before the merging step, by keeping only the input values (resp.…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…A future possible line of work is to investigate some possible combinations with other existing MITM improvements: with the guess of intermediate state bits [21], or with the all-subkeys approach [24]. A promising direction would be to try to make a first selection within each of the two lists before the merging step, by keeping only the input values (resp.…”
Section: Discussionmentioning
confidence: 99%
“…They showed that a meet-in-the-middle key recovery could be applied to six rounds and they gave an upper bound of seven DES rounds to the range of their method. Latter in [21] the efficiency of the meet-in-the-middle was improved for reduced versions of DES to 4, 5, and 6 rounds. Though there exists a meet-in-the-middle attack on 7 rounds of DES that does not start from the first round, ours is the first to reach 7 rounds starting from the beginning (and also 8).…”
Section: Previous Mitm Cryptanalyses Of Reduced Desmentioning
confidence: 99%
See 2 more Smart Citations
“…This is far easier than 2112 attempts. As a result of the meet-in-middle attack, Double DES has not been widely used [4].…”
Section: B Meet-in-middle Attackmentioning
confidence: 99%