5.10.1. on the design of DES - Biham and Shamir showed how "differential cryptanalyis" could make the attack easier than brute-force search of the 2^56 keyspace. Wiener did a thought experiment design of a "DES buster" machine (who ya gonna call?) that could break a DES key in a matter of days. (Similar to the Diffie and Hellman analysis of the mid-70s, updated to current technology.) + The IBM designers knew about differential cryptanalyis, it is now clear, and took steps to optimize DES. After Shamir and Biham published, Don Coppersmith acknowledged this. He's written a review paper: - Coppersmith, D., "The Data Encryption Standard (DES) and its strength against attacks." IBM Journal of Research and Development. 38(3): 243-250. (May 1994)
Next Page: 5.11 Breaking Ciphers
Previous Page: 5.9 Practical Crypto
By Tim May, see README
HTML by Jonathan Rochkind