1993-02-27 - Biham and Shamir on cracking DES

Header Data

From: Marc Horowitz <marc@Athena.MIT.EDU>
To: cypherpunks@toad.com
Message Hash: cff61acc881d3d88882bd55a96113a4323d4fffdaed701219307b3fcfd53289d
Message ID: <9302270616.AA21786@milquetoast.MIT.EDU>
Reply To: N/A
UTC Datetime: 1993-02-27 06:17:19 UTC
Raw Date: Fri, 26 Feb 93 22:17:19 PST

Raw message

From: Marc Horowitz <marc@Athena.MIT.EDU>
Date: Fri, 26 Feb 93 22:17:19 PST
To: cypherpunks@toad.com
Subject: Biham and Shamir on cracking DES
Message-ID: <9302270616.AA21786@milquetoast.MIT.EDU>
MIME-Version: 1.0
Content-Type: text/plain



This is, I believe, the state of the art in published techniques to
break DES.  Note that this attack is basically useless against
one-time or short-lived keys, since there's no chance to make repeated
chosen plaintext attacks against the key.

Short form:  If you can get me to encrypt 2**37 plaintexts *of* *your*
*choice* against my key, you can crack it.

		Marc

This info is forwarded from a friend.

Eli Biham and Adi Shamir, "Differential Cryptanalysis of the full
16-round DES," December 19, 1991.  

The paper was announced in Dec. '91 on the net, and paper copies
circulated from people who had gotten copies directly from Biham &
Shamir.  The paper was submitted to Crypto '92 and presented there on
August 20, 1992.  The Crypto '92 proceedings will be published by
Springer-Verlag at some point, so you could also reference it this
way:

{\sl E.~Biham and A.~Shamir}, Differential Cryptanalysis of the full
16-round DES, {\sl Advances in Cryptology: Proceedings of Crypto '92},
E.~Brickell, ed., {\sl Lecture Notes in Computer Science},
Springer-Verlag, New York, to appear.

Biham is at Technion - Israel Inst. of Tech.
Shamir is at Weizmann Inst. of Science.

I don't know of an FTP site where the paper is available.  





Thread