Presentation 1996/7/22
On the (n-2) round method of Linear Cryptanalysis on DES-MAC
Souichi FURUYA, Fumihiko SANO, Kouichi SAKURAI,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) We have studied on the security of DES-MAC against linear cryptanalysis, which is now one of the strongest known-plaintext attacks for any DES type cryptsystems. In this paper, we propose an extension of linear cryptanalysis using probabilistic counters, and we are able to constract some methods of attacks on DES-MAC, which is the message authentication code by DES. As DES-MAC is 32 bits of left half of ciphertext encoded by, DES, then we cound not decide the exact value of (n-1) round F function so that we counld not implement (n-2) round method. Here we show how we implement (n-2) round method on DES-MAC using probabiristic counters, and we result that we could attck DES12-MAC with 1.14x2^<43> known-plaintext using 2^<14> counters. Hence we can attack DES12-MAC with the same difficulty as the case of the attack on DES.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Linear Cryptanalysis / Maximum Likehood Method / DES-MAC
Paper # ISEC96-12
Date of Issue

Conference Information
Committee ISEC
Conference Date 1996/7/22(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) On the (n-2) round method of Linear Cryptanalysis on DES-MAC
Sub Title (in English)
Keyword(1) Linear Cryptanalysis
Keyword(2) Maximum Likehood Method
Keyword(3) DES-MAC
1st Author's Name Souichi FURUYA
1st Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University()
2nd Author's Name Fumihiko SANO
2nd Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University
3rd Author's Name Kouichi SAKURAI
3rd Author's Affiliation Department of Computer Science and Communication Engineering Kyushu University
Date 1996/7/22
Paper # ISEC96-12
Volume (vol) vol.96
Number (no) 167
Page pp.pp.-
#Pages 12
Date of Issue