• DocumentCode
    1891743
  • Title

    FPGAs as cryptanalytic tools

  • Author

    Gael, Rouvroy ; Francois-Xavier, Standaert

  • Author_Institution
    UCL Crypto Group, Louvain-la-Neuve, Belgium
  • fYear
    2002
  • fDate
    2002
  • Firstpage
    209
  • Lastpage
    214
  • Abstract
    This paper presents FPGA implementations of two cryptanalytic attacks against DES. Linear cryptanalysis results from Matsui´s (1994) work but could not be applied as such and had to be modified to face hardware constraints. We broke a key in about 14 hours on one single FPGA, becoming the fastest implementation to our knowledge. In parallel, we evaluated the possibility of a cryptanalytic time-memory tradeoff using distinguished points. The original idea from Hellman (1980) has never been implemented. We performed first experimental results and designed a machine that can break a 40-bit DES in about 15 seconds, with a high success rate (72%), using one PC. An exhaustive search of the key on the same PC would have taken about 50 days.
  • Keywords
    code standards; cryptography; field programmable gate arrays; telecommunication standards; DES; FPGA; cryptanalytic attacks; cryptanalytic time-memory tradeoff; cryptanalytic tools; exhaustive search; hardware constraints; linear cryptanalysis; Cryptography; Encoding; Field programmable gate arrays; Graphics; Hardware; NIST; Protocols; Standards development; Terminology; US Government;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electrotechnical Conference, 2002. MELECON 2002. 11th Mediterranean
  • Print_ISBN
    0-7803-7527-0
  • Type

    conf

  • DOI
    10.1109/MELECON.2002.1014560
  • Filename
    1014560