Presentation | 1996/5/20 A Cryptographic Role of the Initial Permutation IP of the Data Encryption Standard Fumihiko SANO, Souichi FURUYA, Kouichi SAKURAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We discuss the role of the initial permutation IP of the Data Encryption Standard, in the situation where some bits of ciphertext are unknown. It is considered that the IP has no cryptographic roles. But since differential attack on the CFB mode would be impossible without IP^-1, the IP has a cryptographic role. In the situation where some bits of ciphertext are unknown, for example Message Authentication Code, the security of the DES depends on the locations of the unknown bits. We introduce a effective algorithm for deriving the best linear expression of DES, in a such case. Using this algorithm, we evaluate the cryptographic effects of the IP against the linear cryptanalysis and differential cryptanalysis, and propose an initial permutations that more secure against linear cryptanalysis. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Data Encryption Standard (DES) / Message Authentication Code (MAC) / Choosen plaintext attacks / Differential cryptanalysis / Linear cryptanalysis / Secret-key cipher |
Paper # | ISEC96-2 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1996/5/20(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Cryptographic Role of the Initial Permutation IP of the Data Encryption Standard |
Sub Title (in English) | |
Keyword(1) | Data Encryption Standard (DES) |
Keyword(2) | Message Authentication Code (MAC) |
Keyword(3) | Choosen plaintext attacks |
Keyword(4) | Differential cryptanalysis |
Keyword(5) | Linear cryptanalysis |
Keyword(6) | Secret-key cipher |
1st Author's Name | Fumihiko SANO |
1st Author's Affiliation | Department of Computer Science and Communication Engineering Kyushu University() |
2nd Author's Name | Souichi FURUYA |
2nd Author's Affiliation | Department of Computer Science and Communication Engineering Kyushu University |
3rd Author's Name | Kouichi SAKURAI |
3rd Author's Affiliation | Department of Computer Science and Communication Engineering Kyushu University |
Date | 1996/5/20 |
Paper # | ISEC96-2 |
Volume (vol) | vol.96 |
Number (no) | 47 |
Page | pp.pp.- |
#Pages | 9 |
Date of Issue |