CFP last date
20 May 2024
Reseach Article

Article:Meet in the Middle Attack: A Cryptanalysis Approach

by Shish Ahmad, Mohd. Rizwan Beg, Jameel Ahmad, Nabarun Barua
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 25
Year of Publication: 2010
Authors: Shish Ahmad, Mohd. Rizwan Beg, Jameel Ahmad, Nabarun Barua
10.5120/467-772

Shish Ahmad, Mohd. Rizwan Beg, Jameel Ahmad, Nabarun Barua . Article:Meet in the Middle Attack: A Cryptanalysis Approach. International Journal of Computer Applications. 1, 25 ( February 2010), 1-4. DOI=10.5120/467-772

@article{ 10.5120/467-772,
author = { Shish Ahmad, Mohd. Rizwan Beg, Jameel Ahmad, Nabarun Barua },
title = { Article:Meet in the Middle Attack: A Cryptanalysis Approach },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 25 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number25/467-772/ },
doi = { 10.5120/467-772 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:27.349201+05:30
%A Shish Ahmad
%A Mohd. Rizwan Beg
%A Jameel Ahmad
%A Nabarun Barua
%T Article:Meet in the Middle Attack: A Cryptanalysis Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 25
%P 1-4
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper are to find the two keys using cryptanalysis method, that is used for encrypting the information transferred during communication by using the Meet in the Middle Attack on triple S-DES algorithm, instead of using Brute force attack.

References
  1. [BARK91] Barker. W. Introduction to the analysis of the DES, Laguna Hills, CA : Aegean Pak Press, 1991.
  2. [COPP94] Coppersmith. "The data Encryption standad and its strength against attacks." IBM Journal of research and development, May 1994.
  3. [EFF] Electronic Frountier Fundation, Cracking Des: Secrets of Encryption Research, Wiretap Politics, and Chip Design. Sebastopol, CA: O'Reilly, 1998.
  4. [MENE97] Menezes, A.: Oorshcot, P.; and Vanstone, S. Hand Book of Applied Cryptography. Boca Raton, FL: CRC press 1997.
  5. [SCHN96] Schneier, B. Applied Cryptography. New york: Welly, 1996.
  6. [STIN2002] Stinson, D. Cryptography: Theory and Practices. Boca Raton, FL: CRC Press 2002.
  7. [KUMA97] Kumar, I. Cryptology. Laguna Hills, CA: Aegean Park Press, 1997.
  8. [CAMP92] Campbell, K., and Wiener, M. " Proof that DES is not a group." Proceeding, Crypto '92, 1992; New York: Springer- Verlag.
  9. [BIHA93] Biham, E. and Shamir, A. Differential Cryptanalysis of the data encryption standard. New York: Springer- Verlag 1993.
  10. [MATS93] Matsui, M. " Linear cryptanalysis method for DES cipher. " Proceedings, EUROCRYPT '93; New York: Springer- Verlag 1993.
  11. [OORS90] Oorschot, P. and Eiener, M. "A Known- Plaintext attack on two key triple encryption." Proceeding, EUROCRPT 1990; New York: Springer- Verlag.
  12. [MARK81] Merkle, R., and Hellman, M. "On the security of Multiple Encryption." Communication of the ACM, july 1981.
  13. Sebastien Kunz-Jacques, Frederic Muller, New Improvements of Davies-MurphyCryptanalysis, Advances in Cryptology, proceedings of ASIACRYPT 2005, LectureNotes in Computer Science 3788, pp. 425-442, Springer, 2005.
  14. Lars R. Knudsen, John E. Mathiassen, A Chosen-Plaintext Linear Attack on DES, proceedings of Fast Software Encryption 7, Lecture Notes in Computer Sci-ence 1978, pp. 262-272, Springer, 2001.
  15. "Cryptography and Network Security" Principles and Practices.; Fourth Edition., William Stallings.
Index Terms

Computer Science
Information Sciences

Keywords

DES Meet in the Middle attack Triple S-DES Two Key Method differential and linear cryptanalysis