Abstract
In this paper we study the influence of key scheduling algorithms on the strength of blockciphers. We show that the key scheduling algorithms of many blockciphers inherit obvious relationships between keys, and use these key relations to attack the blockciphers. Two new types of attacks are described: New chosen plaintext reductions of the complexity of exhaustive search attacks (and the faster variants based on complementation properties), and new low-complexity chosen key attacks. These attacks are independent of the number of rounds of the cryptosystems and of the details of the F-function and may have very small complexities. These attacks show that the key scheduling algorithm should be carefully designed and that its structure should not be too simple. These attacks are applicable to both variants of LOKI and to Lucifer. DES is not vulnerable to the related keys attacks since the shift pattern in the key scheduling algorithm is not the same in all the rounds.
Acknowledgment: This research was supported by the fund for the promotion of research at the Technion.
Chapter PDF
Similar content being viewed by others
References
Eli Biham. Adi Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag. 1993.
Eli Biham. Adi Shamir. Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4. No. 1. pp. 3–72. 1991.
Eli Biham. Adi Shamir, Differential Cryptanalysis of Snefru, Khafre. REDOC-II. LOKI and Lucifer (extended abstract). Lecture Notes in Computer Science. Advances in Cryptology. proceedings of CRYPT0’91. pp. 156–171, 1991.
Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry. Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of ASIACRYPT91, to appear.
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT’90, pp. 229–236, 1990.
Lawrence Brown. Jennifer Seberry, Key Scheduling in DES Type Cryptosystems. Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT’90, pp. 221–228. 1990.
M. E. Hellman. R. Merkle, R. Schroppel, L. Washington, W. Diffie. S. Pohlig and P. Schweitzer, Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard, Stanford university, September 1976.
Lars Ramkilde Knudsen, Crypanalysis of LOKI, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of ASIACRYPT’91, to appear.
Lars Ramkilde Knudsen, Crypanalysis of LOKI91, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of AUSCRYPT’92, to appear.
Matthew Kwan. Josef Pieprzyk, A General Purpose Technique for Locating Key Scheduling Weakness in DES-Like Cryptosystems, Lecture Notes in Computer Science. Advances in Cryptology, proceedings of ASIACRYPT’91, to appear.
Xuejia Lai. James L. Massey, Sean Murphy, Markov Ciphers and Differential Cryptanalysis. Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’91. pp. 17–38, 1991.
Xuejia Lai. On the Design and Security of Block Ciphers, Ph.D. thesis. Swiss Federal Institue of Technology, Zurich. 1992.
Shoji Miyaguchi. Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm FEAL-8, Review of electrical communications laboratories. Vol. 36. No. 4. pp. 433–437. 1988.
National Bureau of Standards, Data Encryption Standard, U.S. Department of Commerce, FIPS pub. 46, January 1977.
Akihiro Shimizu, Shoji Miyaguchi, Fast Data Encryption Algorithm FEAL, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’87, pp. 267–278, 1987.
Arthur Sorkin. Lucifer, a Cryptographic Algorithm, Cryptologia, Vol. 8, No. 1, pp. 22–41, January 1984.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biham, E. (1994). New Types of Cryptanalytic Attacks Using Related Keys. In: Helleseth, T. (eds) Advances in Cryptology — EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48285-7_34
Download citation
DOI: https://doi.org/10.1007/3-540-48285-7_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57600-6
Online ISBN: 978-3-540-48285-7
eBook Packages: Springer Book Archive