A Des Example
A Des Example
Results
Table (3.5) shows the progression of the algorithm.
The first row shows the 32-bit values of the left and right halves of
data after the initial permutation.
The next 16 rows show the results after each round.
Also shown is the value of the 48-bit subkey generated for each
round. Note that Li = Ri-1 .
The final row shows the leftand right-hand values after the inverse
initial permutation.
These two values combined form the ciphertext.
Table 3.6 shows the result when the fourth bit of the plaintext is
changed, so that the plaintext is 12468aceeca86420.
The second column of the table shows the intermediate 64-bit values
at the end of each round for the two plaintexts. The third column
shows the number of bits that differ between the two intermediate
values.
The table shows that, after just three rounds, 18 bits differ between
the two blocks.
On completion, the two ciphertexts differ in 32 bit positions.
Table 3.7 shows a similar test using the original plaintext of with two
keys that differ in only the fourth bit position:
the original key,
0f1571c947d9e859, and the altered key,
1f1571c947d9e859.
Again, the results show that about half of the bits in the ciphertext
differ and that the avalanche effect is pronounced after just a few
rounds.
Timing Attacks
We discuss timing attacks in more detail in Part Two,
As they relate to public-key algorithms.
However, the issue may also be relevant for symmetric ciphers.
In essence, a timing attack is one in which information about the key
or the plaintext is obtained by observing how long it takes a given
implementation to perform decryptions on various ciphertexts.
A timing attack exploits the fact that an encryption or decryption
algorithm often takes slightly different amounts of time on different
inputs.
reports on an approach that yields the Hamming weight (number of
bits equal to one) of the secret key.
This is a long way from knowing the actual key, but it is an intriguing
first step.
To conclude that DES appears to be fairly resistant to a successful
timing attack but suggests some avenues to explore.
Although this is an interesting line of attack, it so far appears unlikely
that this technique will ever be successful against DES or more
powerful symmetric ciphers such as triple DES and AES.