On the power of cascade ciphers
- 1 May 1985
- journal article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Computer Systems
- Vol. 3 (2) , 108-116
- https://doi.org/10.1145/214438.214442
Abstract
The unicity distance of a cascade of random ciphers, with respect to known plaintext attack, is shown to be the sum of the key lengths. A time-space trade-off for the exhaustive cracking of a cascade of ciphers is shown. The structure of the set of permutations realized by a cascade is studied; it is shown that only l .2 k exhaustive experiments are necessary to determine the behavior of a cascade of l stages, each having k key bits. It is concluded that the cascade of random ciphers is not a random cipher. Yet, it is shown that, with high probability, the number of permutations realizable by a cascade of l random ciphers, each having k key bits, is 2 lk . Next, it is shown that two stages are not worse than one, by a simple reduction of the cracking problem of any of the stages to the cracking problem of the cascade. Finally, it is shown that proving a nonpolynomial lower bound on the cracking problem of long cascades is a hard task, since such a bound implies that P ≉ NP .Keywords
This publication has 4 references indexed in Scilit:
- The complexity of restricted spanning tree problemsJournal of the ACM, 1982
- An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystemsComputers & Mathematics with Applications, 1981
- Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption StandardComputer, 1977
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949