How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.
From MaRDI portal
Publication:1853119
DOI10.1016/S0020-0190(02)00269-7zbMath1042.68041OpenAlexW1964776377WikidataQ121032350 ScholiaQ121032350MaRDI QIDQ1853119
Publication date: 21 January 2003
Published in: Information Processing Letters (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s0020-0190(02)00269-7
CryptographyCryptanalysisBirthday paradoxData Encryption Standard (DES)Key-collision attacksMultiple-encryptionTriple-DES
Related Items (16)
Another Look at Tightness ⋮ Revisiting the security of DbHtS MACs: beyond-birthday-bound in the multi-user setting ⋮ Multi-key Security: The Even-Mansour Construction Revisited ⋮ Revisiting AES-GCM-SIV: multi-user security, faster key derivation, and better bounds ⋮ Connecting tweakable and multi-key blockcipher security ⋮ A modular approach to the security analysis of two-permutation constructions ⋮ Improved multi-user security using the squared-ratio method ⋮ FAST: secure and high performance format-preserving encryption and tokenization ⋮ The Multi-user Security of Double Encryption ⋮ Time–Memory Trade-Off Attack on the GSM A5/1 Stream Cipher Using Commodity GPGPU ⋮ Clever Arbiters Versus Malicious Adversaries ⋮ Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model ⋮ A client/server implementation of an encryption system for fingerprint user authentication ⋮ 3D: A Three-Dimensional Block Cipher ⋮ Multi-user BBB security of public permutations based MAC ⋮ Quantum generic attacks on key-alternating Feistel ciphers for shorter keys
Cites Work
- Cryptanalysis of triple modes of operation
- An improvement of Davies' attack on DES
- Cryptanalysis of multiple modes of operation
- A cryptanalytic time-memory trade-off
- Markov Ciphers and Differential Cryptanalysis
- A method for obtaining digital signatures and public-key cryptosystems
- Multiple encryption with minimum key
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps.