Academia.eduAcademia.edu

Outline

Logical cryptoanalysis on the example of the cryptosystem DES

Abstract

In the paper on the example of the cryptosystem DES, the successful method of a cryptanalysis is presented. As a result, it is offered as a criterion of the cryptographic security to use a complexity of building and solving the system of Boolean functions, describing the cipher construction procedure. MSC2000: 94A60, 68P25.

References (10)

  1. N. T. Courtois and W. Meier. Algebraic Attacks on Stream Ciphers with Linear Feedback. Proceedings of EUROCRYPT 2003, Lecture Notes in Computer Science 2656, pp. 346-359, 2002.
  2. N. T. Courtois. Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Proceedings of CRYPTO 2003, Lecture Notes in Computer Science 2729, pp. 177-194, 2003.
  3. J.-C. Faugere and G. Ars. An Algebraic Cryptanalysis of Nonlinear Filter Generators using Grobner bases. Rapport de Recherche INRIA 4739, 2003.
  4. M. R. Garey and D. S. Johnson Computers and Intractability. W.H.Freeman and Company, San Francisco, 1979.
  5. J. Gu, P. W. Purdom, J. Franco, and B. W. Wah Algorithms for the Satisfiability (SAT) Problem: A Survey. DIMACS. Series in Discrete Mathematics and Theoretical Computer Science.
  6. A. D. Plotnikov Experimental Algorithm for the Maximum Independent Set Problem.. http://lanl.arxiv.org/abs/0706.3565
  7. C. E. Shannon. Communication theory of secrecy systems. Bell system technical journal, 28, pp. 656-715, 1949.
  8. B. Schneier Applied Cryptography: Protocols, Algorithms, and Source Code in C Paperback, John Wiley & Sons, 1996.
  9. N. P. Smart Cryptography. A McCraw-Hili Publication McGraw-Hill, 2003.
  10. U.S. Department of Commerce/National Institute of Standards and Technology Data Encryption Standard (DES) Federal Information, Pro- cessing Standards Publication 46-3, 1999 October 25.