How to protect DES against exhaustive key search

103Citations
Citations of this article
49Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

The block cipher DESX is defined by DESXk.k1.k2(x) = k2 ⊕ DESk(k1 ⊕ x), where ⊕ denotes bitwise exclusive-or. This construction was first suggested by Ron Rivest as a computationally-cheap way to protect DES against exhaustive key-search attacks. This paper proves, in a formal model, that the DESX construction is sound. We show that, when F is an idealized block cipher, FXk.k1.k2(x) = k2 ⊕ F k(k1 ⊕ x) is substantially more resistant to key search than isF. In fact, our analysis says that FX has an effective key length of at least k + n− 1 − lg m bits, where k is the key length of F, n is the block length, and mbounds the number of pairs the adversary can obtain.

References Powered by Scopus

Communication Theory of Secrecy Systems

7155Citations
N/AReaders
Get full text

Exhaustive Cryptanalysis of the NBS Data Encryption Standard

459Citations
N/AReaders
Get full text

The first experimental cryptanalysis of the data encryption standard

278Citations
N/AReaders
Get full text

Cited by Powered by Scopus

PRINCE - A low-latency block cipher for pervasive computing applications

675Citations
N/AReaders
Get full text

The SKINNY family of block ciphers and its low-latency variant MANTIS

508Citations
N/AReaders
Get full text

Tweakable block ciphers

326Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kilian, J., & Rogaway, P. (1996). How to protect DES against exhaustive key search. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1109, pp. 252–267). Springer Verlag. https://doi.org/10.1007/3-540-68697-5_20

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 30

71%

Professor / Associate Prof. 5

12%

Researcher 5

12%

Lecturer / Post doc 2

5%

Readers' Discipline

Tooltip

Computer Science 34

83%

Mathematics 4

10%

Physics and Astronomy 2

5%

Design 1

2%

Article Metrics

Tooltip
Mentions
References: 3

Save time finding and organizing research with Mendeley

Sign up for free