lect1  Lecture 11

"Differential Cryptanalysis (cont.)"



We will continue the description of the method of Differential Cryptanalysis:

Iterative patterns. Structures. Signal/Noise ratio. Differentials vs. characteristics.
1R,2R,3R attacks. The first round trick. Bytewise (truncated) differentials.
Boomerang attack.

[after the lecture notes]

We have covered basic definitions related to differential cryptanalysis:
1. Active S-box, differential pattern (characteristic), difference distribution tables
2. Design criteria for the S-boxes and for the permutation P
3. 2-round iterative pattern with 3 active S-boxes
all this material can be found in reference 2 or 4 (on-line).

In the next lecture we will show the attack on full 16-round DES and some
extensions of differential cryptanalytic technique.
 

Reading for the lecture
 

1. FIPS PUB: The Data Encryption Standard.

2. Don Coppersmith, "The Data Encryption Standard and its Strength Against Attacks".
IBM TR. [not on-online].

3. Eli Biham, Adi Shamir, "Differential Cryptanalysis of the Full 16-Round DES (.ps)",
   CS 708, December 1991,   Proceedings of Crypto'92, LNCS 740. (see also our library).

4. Eli Biham, Adi Shamir,
     Differential cryptanalysis of DES-like cryptosystems,
     Technical report CS90-16, Weizmann Institute of Science
     CRYPTO'90 & Journal of Cryptology, Vol. 4, No. 1, pp. 3-72, 1991.