Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cycle structure of the DES for keys having palindromic (or antipalindromic) sequences of round keys
Moore J., Simmons G. IEEE Transactions on Software EngineeringSE-13 (2):262-273,1987.Type:Article
Date Reviewed: Feb 1 1988

The data encryption standard (DES) is an encryption method of substantial practical importance; it is widely used in commercial transactions. This paper deals with an issue that is directly related to the question of how secure the DES is. The starting point of the paper is Rivest’s report [1] at Crypto ’85 of the discovery of a plaintext that reappeared after only about 233 iterations of being alternately subjected to superencryption with the all zeros and the all ones DES key. At the same conference Coppersmith proposed an explanation of this unexpected phenomenon, which the paper under review shows to be correct. Cycles that conform to Coppersmith’s explanation, including Rivest’s original cycle, are christened Coppersmith cycles. The authors also show that there are other types of small cycles for certain DES keys.

The paper is well written; because of its mathematical content (which, even though it is not advanced, is pervasive) it is accessible mainly to specialists in cryptanalysis (for whom it should be required reading). However, I am completely mystified why the paper appeared in a software engineering journal.

Reviewer:  E. Leiss Review #: CR111789
1) Kaliski, B. S., Jr.; Rivest, R. L.; and Sherman, A. T.Is DES a pure cipher? (results of more cycling experiments on DES), in Proc. Crypto ’85 (Santa Barbara, CA, Aug. 18–22, 1985), published in Advances in cryptology--CRYPTO ’85 (Lecture notes in computer science; vol. 218), H. C. Williams (Ed.), Springer-Verlag, Berlin, 1986, 212–222.
Bookmark and Share
 
Data Encryption Standard (DES) (E.3 ... )
 
 
Network Protocols (C.2.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption Standard (DES)": Date
Processing encrypted data
Ahituv N., Lapid Y., Neumann S. Communications of the ACM 30(9): 777-780, 1987. Type: Article
Dec 1 1988
A randomized protocol for signing contracts
Even S., Goldreich O., Lempel A. Communications of the ACM 28(6): 637-647, 1985. Type: Article
Dec 1 1985
Differential cryptanalysis of the data encryption standard
Biham E., Shamir A., Springer-Verlag, London, UK, 1993. Type: Book (9780387979304)
Feb 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy