Presentation 2002/5/15
S-Box-and-Bit-Sliced Analysis of DES (IV) : Trellis-based Cipher-only Attack
Tohru KOHDA, Atsushi SHIMONOSONO, Takanobu TERAZONO,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We first introduce a set of the inverse 2-round DES for every S-box to perform a last-round cipher-only attack. Secondly we introduce key-trellis module, a graphical representation of Kullback-Leibler distances between keys. Thirdly, we define a tessellated trellis diagram to reap all observed KL distances in the key-trellis modules and to rank all possible guessed key vectors in order of certainty based on ciphertexts only. Such a tessellated trellis diagram is shown to be a round-number-free ciphertext-only attack and a cost-effective way to enhance its certainty of guessed key within restricted observed ciphertexts too.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) partitioning cryptanalysis / ciphertext-only analysis / S-box-and-bit-slicing / DES / inverse DES / Kullback-Leibler distance / key-trellis module / tessellated trellis diagram
Paper # ISEC2002-4
Date of Issue

Conference Information
Committee ISEC
Conference Date 2002/5/15(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) S-Box-and-Bit-Sliced Analysis of DES (IV) : Trellis-based Cipher-only Attack
Sub Title (in English)
Keyword(1) partitioning cryptanalysis
Keyword(2) ciphertext-only analysis
Keyword(3) S-box-and-bit-slicing
Keyword(4) DES
Keyword(5) inverse DES
Keyword(6) Kullback-Leibler distance
Keyword(7) key-trellis module
Keyword(8) tessellated trellis diagram
1st Author's Name Tohru KOHDA
1st Author's Affiliation Department of Computer Science and Communication Engineering,Kyushu University()
2nd Author's Name Atsushi SHIMONOSONO
2nd Author's Affiliation Department of Computer Science and Communication Engineering,Kyushu University
3rd Author's Name Takanobu TERAZONO
3rd Author's Affiliation Department of Computer Science and Communication Engineering,Kyushu University
Date 2002/5/15
Paper # ISEC2002-4
Volume (vol) vol.102
Number (no) 71
Page pp.pp.-
#Pages 8
Date of Issue