An electronic copy of book is available for Library Members Sign in to view the book
This research paper presents new cryptanalytic techniques targeting the key schedules of block ciphers. The authors introduce attacks based on related-key differential cryptanalysis, where attackers analyze encryption systems using keys and plaintexts with specific relationships. The study evaluates vulnerabilities in several encryption algorithms—including IDEA, G-DES, GOST, SAFER, and three-key Triple-DES—and demonstrates how weaknesses in key schedule design can be exploited in cryptographic protocols. The work contributes significantly to understanding secure cipher design and the importance of robust key scheduling mechanisms.
Sub Title:
Edition:
Volume:
Publisher: Springer Verlag
Publishing Year: 1998
ISBN:
Pages: 15