DocumentCode :
1891743
Title :
FPGAs as cryptanalytic tools
Author :
Gael, Rouvroy ; Francois-Xavier, Standaert
Author_Institution :
UCL Crypto Group, Louvain-la-Neuve, Belgium
fYear :
2002
fDate :
2002
Firstpage :
209
Lastpage :
214
Abstract :
This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanalysis results from Matsui´s (1994) work but could not be applied as such and had to be modified to face hardware constraints. We broke a key in about 14 hours on one single FPGA, becoming the fastest implementation to our knowledge. In parallel, we evaluated the possibility of a cryptanalytic time-memory tradeoff using distinguished points. The original idea from Hellman (1980) has never been implemented. We performed first experimental results and designed a machine that can break a 40-bit DES in about 15 seconds, with a high success rate (72%), using one PC. An exhaustive search of the key on the same PC would have taken about 50 days.
Keywords :
code standards; cryptography; field programmable gate arrays; telecommunication standards; DES; FPGA; cryptanalytic attacks; cryptanalytic time-memory tradeoff; cryptanalytic tools; exhaustive search; hardware constraints; linear cryptanalysis; Cryptography; Encoding; Field programmable gate arrays; Graphics; Hardware; NIST; Protocols; Standards development; Terminology; US Government;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Electrotechnical Conference, 2002. MELECON 2002. 11th Mediterranean
Print_ISBN :
0-7803-7527-0
Type :
conf
DOI :
10.1109/MELECON.2002.1014560
Filename :
1014560
Link To Document :
بازگشت