Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

1.Analyse the meet in the middle attack for double DES.

The meet in the middle attack is one of the types of known plaintext attacks. It is possible to
break a cipher having two or more secret keys for multiple encryption using the same
algorithm.
In Double Des the cipher text is obtained as,
C=Eb(kb,Ea(ka,P))
The plain text is obtained as follows,
M=Da(ka,Eb(kb,C))
Here,
• C is a ciphertext,
• P is a plaintext,
• E is an algorithm for encryption,
• D is an algorithm for decryption,
• ka and kb are two secret keys

The working of the meet in the middle attack is as follows:-


➢ Attacker collects a large number of plain text cipher text pairs
➢ The first relation is used to encrypt known plain text using all possible keys(2 56 keys)
➢ All the output values(M) are recorded in a table
➢ Using the second relation the cipher text C is decrypted using all the key values and
this is also recorded
➢ Both tables are then scanned to find where the M values are the same
➢ The keys that correspond to this value form a pair
➢ Such unique pairs are recorded
➢ In case a matching pair is not found the procedure is repeated using a different set of
plain text and keys.
➢ Attack Complexity:
➢ Attack Complexity= 2X256 =257
➢ We are thus able to obtain a 57-bit security not a 112-bit security.

2. Check the fourth design criterion for S box 2 using the following pair of
inputs: 001100 and 110000.

001100
First bit and last bit=00= decimal representation= 0(row)
2nd through 5th bit=0110 decimal representation=6(column)

Checking the table for S Box 2 we get, 03


Hence, the answer is 3(0011 in binary)

110000
First bit and last bit=10= decimal representation= 2(row)
2nd through 5th bit=1000=decimal representation=8(column)

Checking the S box 2 table we get 05


The answer is 5(0101 in binary)

You might also like