Abstract
With its 56-bit key size, the data encryption standard (DES) seems to be at end of its useful lifetime. Also, the 64-bit DES block size is dangerously small for some applications. We discuss techniques such as triple DES and DESX to push up the key size, and we present DEALKX to increase both block and key size. We propose DEALKX, a new variant of DEAL with an improved key schedule.
Supported by Deutsche Forschungsgemeinschaft (DFG) grant KR1521/3-1.
Chapter PDF
Similar content being viewed by others
References
B. Bakker, R. Weis, S. Lucks, How to Ring a Swan - Adding Tamper Resistant Authentication to Linux IPSec, SANE2000–2nd International System Administration and Networking Conference, Maastricht (2000).
E. Biham, A. Biryukov, An improvement of Davies’ attack on DES, J. Cryptology, Vol. 10 (1997), 195–205.
E. Biham, A Shamir, Differential cryptanalysis of the data encryption standard, Springer (1993).
M. Blaze, W. Diffie, R. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener, Minimal key lengths for symmetric ciphers to provide adequate commercial security. Online: http://theory.lcs.mit.edu/“rivest/publications.html
J. Daemen, Limitations of the Even-Mansour construction, Asia-crypt ‘81, Springer LNCS 739, 495–498.
S. Even, Y. Mansour, A construction of a cipher from a single pseudorandom permutation, Asiacrypt ‘81, Springer LNCS 739, 210–224.
J. Kilian, P. Rogaway, How to protect DES against exhaustive key search, Crypto ‘86, Springer LNCS 1109, 252–267. Full version online: http://wwwcsif.cs.ucdavis.edu/-rogaway/papers/list.html
L. Knudsen, Practically secure Feistel Ciphers, Fast Software Encryption 93, Springer LNCS 809, 211–221.
L. Knudsen: `DEAL - a 128-bit Block Cipher’, February 21, 1998, revised May 15, 1998: http://www.ii.uib.no/“larsr/aes.html.
J. Kelsey, B. Schneier, Key-Schedule Cryptanalysis of DEAL, SAC ‘89.
S. Lucks, Attacking triple encryption, Fast Software Encryption 98, Springer LNCS 1372, 239–257.
S. Lucks, On the security of the 128-bit block cipher DEAL, Fast Software Encryption 99.
Mitsuru Matsui, Linear cryptanalysis method for DES cipher, Eurocrypt ‘83, Springer LNCS 765, 386–397.
R.C. Merkle, M.E. Hellman, On the security of multiple encryption, Communications of the ACM, Vol. 24, No. 7 (1981).
National Institute of Standards and Technology, Data Encryption Standard (DES), FIPS PUB 46–3, Federal Information Processing Standards Publication, Reaffirmed 1999 October 25, US Department of Commerce.
P.C. van Oorschot, M.J. Wiener, A known-plaintext attack on two-key triple encryption, Eurocrypt ‘80, Springer LNCS 473, 318–325.
P.C. van Oorschot, M.J. Wiener, Improving implementable meetin-the-middle attacks by orders of magnitude, Crypto ‘86, Springer LNCS 1109, 229–236.
M. Smid, E. Roback, J. Foti, `AES Workshop. To Discuss the AES Evaluation Criteria and Submission Requirements.’ National Institute of Standards and Technology, April 15, 1997. Online: http://csrc.nist.gov/encryption/aes/pre-roundl/earlyaes.htm
R. Outerbridge, private communication.
S. Vaudenay, `On Comparing the Security of Block Ciphers’, manuscript, 1998.
R. Weis, W. Effelsberg, S. Lucks, `Remotely Keyed Encryption with Java Cards: A Secure and Efficient Method to Encrypt Multimedia Streams’, IEEE International Conference on Multimedia and Expo (2000).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Lucks, S., Weis, R. (2000). How to Make DES-Based Smartcards Fit for the 21-St Century. In: Domingo-Ferrer, J., Chan, D., Watson, A. (eds) Smart Card Research and Advanced Applications. IFIP — The International Federation for Information Processing, vol 52. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35528-3_6
Download citation
DOI: https://doi.org/10.1007/978-0-387-35528-3_6
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-6526-7
Online ISBN: 978-0-387-35528-3
eBook Packages: Springer Book Archive