📄 12-14.html
字号:
<option value="/reference/dir.y2k1.html">Y2K <option value="">----------- <option value="/reference/whatsnew.html">New Titles <option value="">----------- <option value="/reference/dir.archive1.html">Free Archive </SELECT> </font></td> </tr> </table> </form><!-- LEFT NAV SEARCH END --> </td> <!-- PUB PARTNERS END --><!-- END LEFT NAV --><td rowspan="8" align="right" valign="top"><img src="/images/iswbls.gif" width=1 height=400 alt="" border="0"></td><td><img src="/images/white.gif" width="5" height="1" alt="" border="0"></td><!-- end of ITK left NAV --><!-- begin main content --><td width="100%" valign="top" align="left"><!-- END SUB HEADER -->
<!--Begin Content Column -->
<FONT FACE="Arial,Helvetica" SIZE="-1">
To access the contents, click the chapter and section titles.
</FONT>
<P>
<B>Applied Cryptography, Second Edition: Protocols, Algorthms, and Source Code in C (cloth)</B>
<FONT SIZE="-1">
<BR>
<I>(Publisher: John Wiley & Sons, Inc.)</I>
<BR>
Author(s): Bruce Schneier
<BR>
ISBN: 0471128457
<BR>
Publication Date: 01/01/96
</FONT>
<P>
<form name="Search" method="GET" action="http://search.earthweb.com/search97/search_redir.cgi">
<INPUT TYPE="hidden" NAME="Action" VALUE="Search">
<INPUT TYPE="hidden" NAME="SearchPage" VALUE="http://search.earthweb.com/search97/samples/forms/srchdemo.htm">
<INPUT TYPE="hidden" NAME="Collection" VALUE="ITK">
<INPUT TYPE="hidden" NAME="ResultTemplate" VALUE="itk-full.hts">
<INPUT TYPE="hidden" NAME="ViewTemplate" VALUE="view.hts">
<font face="arial, helvetica" size=2><b>Search this book:</b></font><br>
<INPUT NAME="queryText" size=50 VALUE=""> <input type="submit" name="submitbutton" value="Go!">
<INPUT type=hidden NAME="section_on" VALUE="on">
<INPUT type=hidden NAME="section" VALUE="http://www.itknowledge.com/reference/standard/0471128457/">
</form>
<!-- Empty Reference Subhead -->
<!--ISBN=0471128457//-->
<!--TITLE=APPLIED CRYPTOGRAPHY, SECOND EDITION: Protocols, Algorithms, and Source Code in C//-->
<!--AUTHOR=Bruce Schneier//-->
<!--PUBLISHER=Wiley Computer Publishing//-->
<!--CHAPTER=12//-->
<!--PAGES=293-297//-->
<!--UNASSIGNED1//-->
<!--UNASSIGNED2//-->
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="12-13.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="12-15.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
<P><BR></P>
<H3><A NAME="Heading6"></A><FONT COLOR="#000077">12.5 The Real Design Criteria</FONT></H3>
<P>After differential cryptanalysis became public, IBM published the design criteria for the S-boxes and the P-box [373,374]. The criteria for the S-boxes are:
</P>
<DL>
<DD>— Each S-box has 6 input bits and 4 output bits. (This was the largest size that could be accommodated in a single chip with 1974 technology.)
<DD>— No output bit of an S-box should be too close to a linear function of the input bits.
<DD>— If you fix the left-most and right-most bits of an S-box and vary the 4 middle bits, each possible 4-bit output is attained exactly once.
<DD>— If two inputs to an S-box differ in exactly 1 bit, the outputs must differ in at least 2 bits.
<DD>— If two inputs to an S-box differ in the 2 middle bits exactly, the outputs must differ in at least 2 bits.
<DD>— If two inputs to an S-box differ in their first 2 bits and are identical in their last 2 bits, the two outputs must not be the same.
<DD>— For any nonzero 6-bit difference between inputs, no more than 8 of the 32 pairs of inputs exhibiting that difference may result in the same output difference.
<DD>— A criterion similar to the previous one, but for the case of three active S-boxes.
</DL>
<P>The criteria for the P-box are:
</P>
<DL>
<DD>— The 4 output bits from each S-box in round i are distributed so that 2 of them affect the middle-bits of S-boxes at round<I>i</I> + 1 and the other 2 affect end bits.
<DD>— The 4 output bits from each S-box affect six different S-boxes; no 2 affect the same S-box.
<DD>— If the output bit from one S-box affects a middle bit of another S-box, then an output bit from that other S-box cannot affect a middle bit of the first S-box.
</DL>
<P>The paper goes on to discuss the criteria. Generating S-boxes is pretty easy today, but was a complicated task in the early 1970s. Tuchman has been quoted as saying that they ran computer programs for months cooking up the S-boxes.
</P>
<H3><A NAME="Heading7"></A><FONT COLOR="#000077">12.6 DES Variants</FONT></H3>
<P><FONT SIZE="+1"><B><I>Multiple DES</I></B></FONT></P>
<P>Some DES implementations use triple-DES (see Figure 12.10) [55]. Since DES is not a group, then the resultant ciphertext is much harder to break using exhaustive search: 2<SUP>112</SUP> attempts instead of 2<SUP>56</SUP> attempts. See Section 15.2 for more details.</P>
<I><P><A NAME="Fig10"></A><A HREF="javascript:displayWindow('images/12-10.jpg',272,126 )"><IMG SRC="images/12-10t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/12-10.jpg',272,126)"><FONT COLOR="#000077"><B>Figure 12.10</B></FONT></A> Triple-DES.</I>
</P>
<P><FONT SIZE="+1"><B><I>DES with Independent Subkeys</I></B></FONT></P>
<P>Another variation is to use a different subkey for each round, instead of generating them from a single 56-bit key [851]. Since 48 key bits are used in each of 16 rounds, this means that the key length for this variant is 768 bits. This variant would drastically increase the difficulty of a brute-force attack against the algorithm; that attack would have a complexity of 2<SUP>768</SUP>.</P>
<P>However, a meet-in-the-middle attack (see Section 15.1) would be possible. This would reduce the complexity of attack to 2<SUP>384</SUP>; still long enough for any conceivable security needs.</P>
<P>Although independent subkeys foil linear cryptanalysis, this variant is susceptible to differential cryptanalysis and can be broken with 2<SUP>61</SUP> chosen plaintexts (see Table 12.15) [167,172]. It would seem that any modification of the key schedule cannot make DES much stronger.</P>
<P><FONT SIZE="+1"><B><I>DESX</I></B></FONT></P>
<P>DESX is a DES variant from RSA Data Security, Inc. that has been included in the MailSafe electronic mail security program since 1986 and the BSAFE toolkit since 1987. DESX uses a technique called whitening (see Section 15.6) to obscure the inputs and outputs to DES. In addition to a 56-bit DES key, DESX has an additional 64-bit whitening key. These 64 bits are XORed to the plaintext before the first round of DES. An additional 64 bits, computed as a one-way function of the entire 120-bit DES key, is XORed to the ciphertext after the last round [155]. Whitening makes DESX much stronger than DES against a brute-force attack; the attack requires (2<SUP>120</SUP>)/<I>n</I> operations with <I>n</I> known plaintexts. It also improves security against differential and linear cryptanalysis; the attacks require 2<SUP>61</SUP> chosen plaintexts and 2<SUP>60</SUP> known plaintexts, respectively [1338].</P>
<P><FONT SIZE="+1"><B><I>CRYPT(3)</I></B></FONT></P>
<P>CRYPT(3) is a DES variant found on UNIX systems. It is primarily used as a one-way function for passwords, but sometimes can also be used for encryption. The difference between CRYPT(3) and DES is that CRYPT(3) has a key-dependent expansion permutation with 2<SUP>12</SUP> possible permutations. This was done primarily so that off-the-shelf DES chips could not be used to construct a hardware password-cracker.</P>
<P><FONT SIZE="+1"><B><I>Generalized DES</I></B></FONT></P>
<P>Generalized DES (GDES) was designed both to speed up DES and to strengthen the algorithm [1381,1382]. The overall block size increases while the amount of computation remains constant.
</P>
<P>Figure 12.11 is a block diagram of GDES. GDES operates on variable-sized blocks of plaintext. Encryption blocks are divided up into <I>q</I> 32-bit sub-blocks; the exact number depends on the total block size (this was variable in the design, but must be fixed for each implementation). In general, <I>q</I> equals the block size divided by 32.</P>
<P>Function f is calculated once per round on the right-most block. The result is XORed with all the other parts, which are then rotated to the right. GDES has a variable number of rounds, <I>n.</I> There is a slight modification to the last round, so that the encryption and decryption processes differ only in the order of the subkeys (just like DES). In fact, if <I>q</I> = 2 and <I>n</I> = 16, this <I>is</I> DES.</P>
<P>Biham and Shamir [167,168] showed that, using differential cryptanalysis, GDES with <I>q</I> = 8 and <I>n</I> = 16 is breakable with only six chosen plaintexts. If independent subkeys are also used, 16 chosen plaintexts are required. GDES with <I>q</I> = 8 and <I>n</I> = 22 is breakable with 48 chosen plaintexts, and GDES with <I>q</I> = 8 and <I>n</I> = 31 requires only 500,000 chosen plaintexts to break. Even GDES with <I>q</I> = 8 and <I>n</I> = 64 is weaker than DES; 2<SUP>49</SUP> chosen plaintexts are required to break it. In fact, any GDES scheme that is faster than DES is also less secure (see Table 12.15).</P>
<P>A variant of this scheme recently appeared [1591]. It is probably no more secure than the original GDES. In general, any large block DES variant that is faster than DES is probably also less secure than DES.</P>
<P><FONT SIZE="+1"><B><I>DES with Alternate S-Boxes</I></B></FONT></P>
<P>Other DES modifications centered around the S-boxes. Some designs made the order of the S-boxes variable. Other designers varied the contents of the S-boxes themselves. Biham and Shamir showed [170,172] that the design of the S-boxes, and even the order of the S-boxes themselves, were optimized against differential cryptanalysis:
</P>
<BLOCKQUOTE><P>The replacement of the order of the eight DES S-boxes (without changing their value) also makes DES much weaker: DES with 16 rounds of a particular replaced order is breakable in about 2<SUP>38</SUP> steps.... DES with random S-boxes is shown to be very easy to break. Even a minimal change of one entry of one of the DES S-boxes can make DES easier to break.</P>
</BLOCKQUOTE><P>The DES S-boxes were not optimized against linear cryptanalysis. There are better S-boxes than the ones that come with DES, but blindly choosing new S-boxes isn’t a good idea.
</P>
<I><P><A NAME="Fig11"></A><A HREF="javascript:displayWindow('images/12-11.jpg',227,274 )"><IMG SRC="images/12-11t.jpg"></A>
<BR><A HREF="javascript:displayWindow('images/12-11.jpg',227,274)"><FONT COLOR="#000077"><B>Figure 12.11</B></FONT></A> GDES.</I>
</P>
<P>Table 12.15 [167,169] lists some modifications to DES and the number of chosen plaintexts required for differential cryptanalysis. One change not listed, combining the left and right halves using addition mod 2<SUP>4</SUP> instead of XOR, is 2<SUP>17</SUP> times harder to break than DES [689].</P><P><BR></P>
<CENTER>
<TABLE BORDER>
<TR>
<TD><A HREF="12-13.html">Previous</A></TD>
<TD><A HREF="../ewtoc.html">Table of Contents</A></TD>
<TD><A HREF="12-15.html">Next</A></TD>
</TR>
</TABLE>
</CENTER>
[an error occurred while processing this directive]
<!-- all of the reference materials (books) have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- BEGIN SUB FOOTER --> <br><br> </TD> </TR> </TABLE> <table width="640" border=0 cellpadding=0 cellspacing=0> <tr> <td align="left" width=135><img src="/images/white.gif" width=100 height="1" alt="" border="0"></td> <!-- END SUB FOOTER -->
<!-- all of the books have the footer and subfoot reveresed --><!-- reference_subfoot = footer --><!-- reference_footer = subfoot --><!-- FOOTER --> <td width="515" align="left" bgcolor="#FFFFFF"><font face="arial, helvetica" size="1"><b><a href="/products.html"><font color="#006666">Products</font></a> | <a href="/contactus.html"><font color="#006666">Contact Us</font></a> | <a href="/aboutus.html"><font color="#006666">About Us</font></a> | <a href="http://www.earthweb.com/corporate/privacy.html" target="_blank"><font color="#006666">Privacy</font></a> | <a href="http://www.itmarketer.com/" target="_blank"><font color="#006666">Ad Info</font></a> | <a href="/"><font color="#006666">Home</font></a></b> <br><br> Use of this site is subject to certain <a href="/agreement.html">Terms & Conditions</a>, <a href="/copyright.html">Copyright © 1996-1999 EarthWeb Inc.</a><br> All rights reserved. Reproduction whole or in part in any form or medium without express written permision of EarthWeb is prohibited.</font><p></td> </tr></table></BODY></HTML><!-- END FOOTER -->
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -