Abstract
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear attack. These attacks are based on the same principles as the corresponding attacks on the ECB mode, They are compared to the three basic attacks on the CFB mode. In 8-bit CFB and with 8 rounds in stead of 16, a differential attack with 239.4 chosen ciphertexts can find 3 key bits, and a linear attack with 231 known plaintexts can find 7 key bits. This suggests that it is not safe to reduce the number of rounds in order to improve the performance. Moreover, it is shown that the final permutation has some cryptographic significance in the CFB mode.
N.F.W.O. postdoctoral researcher, sponsored by the National Fund for Scientific Research (Belgium).
N.F.W.O. research assistant, sponsored by the National Fund for Scientific Research (Belgium).
Chapter PDF
Similar content being viewed by others
Keywords
- Block Cipher
- Differential Attack
- Data Encryption Standard
- Linear Cryptanalysis
- Differential Cryptanalysis
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A. Beguelin, J. J. Dongarra, G. A. Geist, R. Mancheck, and V. Sunderam, “A users’ guide to PVM parallel virtual machine”, Technical report ORNL/TM-11826, Oak Ridge National Laboratory, July 1991.
A. Beguelin, J. J. Dongarra, R. Manchek, K. Moore, R. Wade, J. Plank, and V. Sunderam, “HeNCE: a use’s guide”, Version 1.2, December 1992.
E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, Vol. 4, No. 1, 1991, pp. 3–72.
E. Biham and A. Shamir, “Differential cryptanalysis of Feal and N-hash,” Advances in Cryptology, Proc. Eurocrypt’91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 1–16.
E. Biham and A. Shamir, “Differential cryptanalysis of the full 16-round DES,” Technion Technical Report # 708, December 1991.
D. Chaum and J.-H. Evertse, “Cryptanalysis of DES with a reduced number of rounds,” Advances in Cryptology, Proc. Crypto’85, LNCS 218, H.C. Williams, Ed., Springer-Verlag, 1985, pp. 192–211.
D. Davies, “Investigation of a potential weakness in the DES algorithm,” July 1987 (revised January 1990), preprint.
FIPS 46, “Data Encryption Standard,” Federal Information Processing Standard, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977.
FIPS 81, “DES Modes of Operation,” Federal Information Processing Standard, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., December 1980.
M. Hellman, R. Merkle, R. Schroeppel, L. Washington, W. Diffie, S. Pohlig and P. Schweitzer, “Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard,” Information Systems Lab., Dept. of Electrical Eng., Stanford Univ., 1976.
ISO/IEC 10116, “Information technology-Security techniques-Modes of operation of an n-bit block cipher algorithm,” 1991.
R.R. Jueneman, “Analysis of certain aspects of Output Feedback Mode,” Advances in Cryptology, Proc. Crypto’82, D. Chaum, R.L. Rivest, and A.T. Sherman, Eds., Plenum Press, New York, 1983, pp. 99–127.
M. Matsui, “Linear cryptanalysis method for DES cipher,” Advances in Cryptology, Proc. Eurocrypt’93, LNCS, Springer-Verlag, to appear.
U.M. Maurer, “New approaches to the design of self-synchronizing stream ciphers,” Advances in Cryptology, Proc. Eurocrypt’91, LNCS 547, D.W. Davies, Ed., Springer-Verlag, 1991, pp. 458–471.
K. Ohta and M. Matsui, “Differential attack on message authentication codes,” This Volume.
M. Wiener, “Efficient DES key search,” This Volume.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Preneel, B., Nuttin, M., Rijmen, V., Buelens, J. (1994). Cryptanalysis of the CFB mode of the DES with a reduced number of rounds. In: Stinson, D.R. (eds) Advances in Cryptology — CRYPTO’ 93. CRYPTO 1993. Lecture Notes in Computer Science, vol 773. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48329-2_19
Download citation
DOI: https://doi.org/10.1007/3-540-48329-2_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57766-9
Online ISBN: 978-3-540-48329-8
eBook Packages: Springer Book Archive