Abstract

In this paper differential attack on S-DES is carried out. S-DES is the reduced version of DES algorithm. This algorithm operates on 8-bit message block with 10-bit key and DES operates on 64-bit message block with 56-bit key. This paper analyzed the differential attack on S-DES. Differential attack is used to break a cipher by trying each possible key.

Highlights

  • Security is the main concerns of the organizations participating in the information revolution

  • It has similar properties to DES but deals with a much smaller block and key size. It was designed as a test block cipher for learning about modern cryptanalytic techniques such as differential cryptanalysis

  • Differential cryptanalysis involves the analysis of the effect of the plaintext pair difference on the resulting ciphertext difference.[4]Consider the following basic linear cipher function: C=P K

Read more

Summary

INTRODUCTION

Security is the main concerns of the organizations participating in the information revolution. It has similar properties to DES but deals with a much smaller block and key size (operates on 8-bit message blocks with a 10-bit key). It was designed as a test block cipher for learning about modern cryptanalytic techniques such as differential cryptanalysis. It is a variant of Simplified DES. The same key is used for encryption and decryption. The schedules of addressing the key bits are altered so that the decryption is the reverse of encryption. It is applied to a permutation which is the inverse of the initial permutation. [2]

DIFFERENTIAL ATTACK ON S-DES
Difference distribution table
RESULT

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.