In this paper we consider a chosen-plaintext variant of the linear attack on DES introduced by Matsui. By choosing plaintexts in a clever way one can reduce the number of plaintexts required in a successful linear attack. This reduces the amount of plaintexts to find key bits to a factor of more than four compared to Matsui's attack. To estimate the probabilities of success in the attack we did extensive experiments on DES reduced to 8 and 12 rounds. We believe that the results in this paper contain the fastest attack on the DES reported so far in the open literature. As an example, one attack needs about 242 chosen texts, finds 12 bits of key information and succeeds with a probability of about 86%. An additional 12 key bits can be found by similar methods. For comparison, Matsui's attack on the DES needs about 244 known texts, finds 13 bits of the key and succeeds with a probability of 78%. Of independent interest is a new approach searching for "pseudo-keys", which are secret key bits added an unknown but fixed value. These bits can be used to find the secret key bits at a later stage in the analysis.
[1]
Mitsuru Matsui,et al.
On Correlation Between the Order of S-boxes and the Strength of DES
,
1994,
EUROCRYPT.
[2]
Serge Vaudenay,et al.
An experiment on DES statistical cryptanalysis
,
1996,
CCS '96.
[3]
Matthew J. B. Robshaw,et al.
Non-Linear Approximations in Linear Cryptanalysis
,
1996,
EUROCRYPT.
[4]
Toshinobu Kaneko,et al.
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES
,
1998,
CRYPTO.
[5]
Mitsuru Matsui,et al.
A New Method for Known Plaintext Attack of FEAL Cipher
,
1992,
EUROCRYPT.
[6]
Mitsuru Matsui,et al.
Linear Cryptanalysis Method for DES Cipher
,
1994,
EUROCRYPT.
[7]
Mitsuru Matsui,et al.
The First Experimental Cryptanalysis of the Data Encryption Standard
,
1994,
CRYPTO.
[8]
Matthew J. B. Robshaw,et al.
Linear Cryptanalysis Using Multiple Approximations
,
1994,
CRYPTO.