메뉴 건너뛰기




Volumn 84, Issue 3, 2002, Pages 117-124

How to decrypt or even substitute DES-encrypted messages in 228 steps

Author keywords

Birthday paradox; Cryptanalysis; Cryptography; Data Encryption Standard (DES); Key collision attacks; Multiple encryption; Triple DES

Indexed keywords

CODES (SYMBOLS); DATA HANDLING; PROBABILITY; SECURITY OF DATA;

EID: 0037110729     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/S0020-0190(02)00269-7     Document Type: Article
Times cited : (67)

References (37)
  • 2
    • 0005272834 scopus 로고    scopus 로고
    • Cryptanalysis of multiple modes of operation
    • (1998) J. Cryptology , vol.11 , Issue.1 , pp. 45-58
    • Biham, E.1
  • 3
    • 0005358325 scopus 로고    scopus 로고
    • Cryptanalysis of triple modes of operation
    • (1999) J. Cryptology , vol.12 , Issue.3 , pp. 161-184
    • Biham, E.1
  • 12
    • 0005348344 scopus 로고    scopus 로고
    • Breaking one million DES keys
    • 15, Y. Desmedt, J.-J. Quisquater, and F. Hoornaert
    • (1998) Eurocrypt'86 , pp. 91-95
    • Desmedt, Y.1
  • 36


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.