Presentation | 1996/7/22 On the (n-2) round method of Linear Cryptanalysis on DES-MAC Souichi FURUYA, Fumihiko SANO, Kouichi SAKURAI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We have studied on the security of DES-MAC against linear cryptanalysis, which is now one of the strongest known-plaintext attacks for any DES type cryptsystems. In this paper, we propose an extension of linear cryptanalysis using probabilistic counters, and we are able to constract some methods of attacks on DES-MAC, which is the message authentication code by DES. As DES-MAC is 32 bits of left half of ciphertext encoded by, DES, then we cound not decide the exact value of (n-1) round F function so that we counld not implement (n-2) round method. Here we show how we implement (n-2) round method on DES-MAC using probabiristic counters, and we result that we could attck DES12-MAC with 1.14x2^<43> known-plaintext using 2^<14> counters. Hence we can attack DES12-MAC with the same difficulty as the case of the attack on DES. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Linear Cryptanalysis / Maximum Likehood Method / DES-MAC |
Paper # | ISEC96-12 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 1996/7/22(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | On the (n-2) round method of Linear Cryptanalysis on DES-MAC |
Sub Title (in English) | |
Keyword(1) | Linear Cryptanalysis |
Keyword(2) | Maximum Likehood Method |
Keyword(3) | DES-MAC |
1st Author's Name | Souichi FURUYA |
1st Author's Affiliation | Department of Computer Science and Communication Engineering Kyushu University() |
2nd Author's Name | Fumihiko SANO |
2nd Author's Affiliation | Department of Computer Science and Communication Engineering Kyushu University |
3rd Author's Name | Kouichi SAKURAI |
3rd Author's Affiliation | Department of Computer Science and Communication Engineering Kyushu University |
Date | 1996/7/22 |
Paper # | ISEC96-12 |
Volume (vol) | vol.96 |
Number (no) | 167 |
Page | pp.pp.- |
#Pages | 12 |
Date of Issue |