The Nature of the DES Algorithm
Another concern is the possibility that cryptanalysis is
possible by exploiting the characteristics of the DES algorithm. The focus of
concern has been on the eight substitution tables, or S-boxes, that are used in
each iteration. Because the design criteria for these boxes, and indeed for the
entire algorithm, were not made public, there is a suspicion that the boxes were
constructed in such a way that cryptanalysis is possible for an opponent who
knows the weaknesses in the S-boxes. This assertion is tantalizing, and over the years a
number of regularities and unexpected behaviors of the S-boxes have been
discovered. Despite this, no one has so far succeeded in discovering the
supposed fatal weaknesses in the S-boxes.[8]
No comments:
Post a Comment