[Resource Topic] 2021/336: On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES

Welcome to the resource topic for 2021/336

Title:
On Closed-Cycle Loops and Applicability of Nonlinear Product Attacks to DES

Authors: Nicolas T. Courtois, Matteo Abbondati, Hamy Ratoanina, Marek Grajek

Abstract:

In this article we look at the question of the security of Data Encryption Standard (DES) against non-linear polynomial invariant attacks. Is this sort of attack also possible for DES? We present a simple proof of concept attack on DES where a product of 5 polynomials is an invariant for 2 rounds of DES. Furthermore we present numerous additional examples of invariants with higher degrees. We analyse the success probability when the Boolean functions are chosen at random and compare to DES S-boxes. For more complex higher degree attacks the difficulties disappear progressively and up to 100 % of all Boolean functions in 6 variables are potentially vulnerable. A major limitation for all our attacks, is that they work only for a fraction of the key space. However in some cases, this fraction of the key space is very large for the full 16-round DES.

ePrint: https://eprint.iacr.org/2021/336

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .