Presentation 1996/5/20
A Cryptographic Role of the Initial Permutation IP of the Data Encryption Standard
Fumihiko SANO, Souichi FURUYA, Kouichi SAKURAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We discuss the role of the initial permutation IP of the Data Encryption Standard, in the situation where some bits of ciphertext are unknown. It is considered that the IP has no cryptographic roles. But since differential attack on the CFB mode would be impossible without IP^-1, the IP has a cryptographic role. In the situation where some bits of ciphertext are unknown, for example Message Authentication Code, the security of the DES depends on the locations of the unknown bits. We introduce a effective algorithm for deriving the best linear expression of DES, in a such case. Using this algorithm, we evaluate the cryptographic effects of the IP against the linear cryptanalysis and differential cryptanalysis, and propose an initial permutations that more secure against linear cryptanalysis.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Data Encryption Standard (DES) / Message Authentication Code (MAC) / Choosen plaintext attacks / Differential cryptanalysis / Linear cryptanalysis / Secret-key cipher
Paper # ISEC96-2
Date of Issue

Conference Information
Committee ISEC
Conference Date 1996/5/20(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Cryptographic Role of the Initial Permutation IP of the Data Encryption Standard
Sub Title (in English)
Keyword(1) Data Encryption Standard (DES)
Keyword(2) Message Authentication Code (MAC)
Keyword(3) Choosen plaintext attacks
Keyword(4) Differential cryptanalysis
Keyword(5) Linear cryptanalysis
Keyword(6) Secret-key cipher
1st Author's Name Fumihiko SANO
1st Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University()
2nd Author's Name Souichi FURUYA
2nd Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University
3rd Author's Name Kouichi SAKURAI
3rd Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University
Date 1996/5/20
Paper # ISEC96-2
Volume (vol) vol.96
Number (no) 47
Page pp.pp.-
#Pages 9
Date of Issue