Abstract
In this paper we examine closely a new mode of the Data Encryption Standard (DES), which is included in a new chip called SuperCrypt. This mode allows for a 112-bit key which encrypts at the same speed as DES. Initially, we give some background on the development of the cipher, and then proceed to cryptanalyse it using differential cryptanalysis and a combination of linear and differential cryptanalysis. We present results for the four, six and eight-round versions and comparisons with the DES. We theoretically extend this to the full sixteen-round version. Finally, we look at exhaustive key search in light of the fact that it has been proven feasible to construct a machine at realistic cost to find the DES key in a matter of hours.
Chapter PDF
Similar content being viewed by others
References
E. Binham and A. Shamir Differential Cryptanalysis of DES-like Cryptosystems Journal of Cryptology, 4(1):3–72, 1991.
M. Matsui. Linear Cryptanalysis Method for DES Cipher Advances in Cryptology: Proceedings of EUROCRYPT ‘83, Springer-Verlag, Berlin, pp 386–397, 1994.
M. Matsui.On Correlation Between the Order of S-Boxes and the Strength of DES Preproceedings of EUROCRYPT ‘84, pp 375–387, 1994.
M. Matsui. The First Experimental Cryptanalysis of the Data Encryption Standard Advances in Cryptology: Proceedings of CRYPTO ‘84, Springer-Verlag, Berlin, pp 1–11, 1994.
M.J. Wiener. Efficient DES Key Search Workshop on Selected Areas in Cryptography (SAC ‘84), Queen’s University, Canada, p 1, 1994.
H. Feistel. Cryptography and Computer Privacy Scientific American, Vol.228, No.5, May 1973, pp 15–23.
SuperCrypt — High Speed Cryptographic Data Security Element CE Infosys 99C003 Preliminary Data Sheet Vers 1.01, Computer Elecktonic Infosys GmbH, Germany.
R.C. Merkle and M. Hellman. On the Security of Multiple Encryption Communications of the ACM, v.24,n.7, 1981, pp 465–467.
W. Tuchman. Hellman Presents No Shortcut Solutions to DES IEEE Spectrum, v.16, n.7, July 1979, pp 40–41.
P.C. van Oorschot and M.J. Wiener. A Known-Plaintext Attack on Two-Key Triple Encryption Advances in Cryptology - EUROCRYPT’90 Proceedings, Berlin: Springer-Verlag, 1991, pp 318–325.
E. Biham and A. Shamir. Differential Cryptanalysis of the Full 16-round DES Advances in Cryptology — CRYPTO’92, Springer-Verlag, Berlin, pp 487–496, 1993.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1995 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Cartert, G., Clarkt, A., Dawsont, E., Nielsent, L. (1995). Analysis of DES Double Key Mode. In: Eloff, J.H.P., von Solms, S.H. (eds) Information Security — the Next Decade. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-34873-5_10
Download citation
DOI: https://doi.org/10.1007/978-0-387-34873-5_10
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2910-7
Online ISBN: 978-0-387-34873-5
eBook Packages: Springer Book Archive