Unit 3-Symmetric Key Crypto_Part22

Unit 3-Symmetric Key Crypto_Part22 - Designers of DES were...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 3 - 43 Security of DES Security of DES depends a lot on S-boxes Everything else in DES is linear Thirty years of intense analysis has revealed no “back door” Attacks today use exhaustive key search Conclusions Designers of DES knew what they were doing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Designers of DES were ahead of their time Unit 3 - 44 Cryptanalysis of DES Brute Force requires about 2 56 operations -impractical in 1977 Wiener describes custom VLSI parallel search engine...
View Full Document

This note was uploaded on 03/17/2011 for the course ECE 4472 taught by Professor Ouda during the Fall '10 term at UWO.

Page1 / 2

Unit 3-Symmetric Key Crypto_Part22 - Designers of DES were...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online