What will happen if we change the DES encryrption algorithm to use the same key in each round ?
How will it affect the encryption - will it only make the encryption same as decryption or are the more effects ? I couldn't find any other possible effects in the DES standard description.
Thanks
-
$\begingroup$ Don’t do it. It’s a bad idea. $\endgroup$Yuval Filmus– Yuval Filmus2018年11月13日 16:18:07 +00:00Commented Nov 13, 2018 at 16:18
-
$\begingroup$ @YuvalFilmus - But what will be the effects ? besides making the decryption\encryption the same, what are the additional effects ? It's a theoretical question i have and can't figure out what else will happen $\endgroup$caffein– caffein2018年11月13日 18:04:30 +00:00Commented Nov 13, 2018 at 18:04
-
$\begingroup$ For one, it will make it easier to "guess" they key – all you need to do now is to guess one round key. Also, there might be a way to use a Pollard rho-type idea to somehow get input/output pairs for a single round. $\endgroup$Yuval Filmus– Yuval Filmus2018年11月13日 18:17:10 +00:00Commented Nov 13, 2018 at 18:17
-
$\begingroup$ @YuvalFilmus - In the first case, did you mean we now have to guess only 2^48 combinations ? But in this case you need to be able to have access to the encryption machine so you'll be able to force the 48-bit value into the K- variable in each round instead of feeding the key from outside. Do you assume such an access to the machine ? how likely is this scenario ? What can you really do with the K value itself in reality - usually all we can do is feed the key itself from outside the machine $\endgroup$caffein– caffein2018年11月13日 18:24:56 +00:00Commented Nov 13, 2018 at 18:24
-
$\begingroup$ Because knowing the K value doesn't mean we know how the permutation of K really works. If we see a "1" somewhere in K we can't know which position in the key it came from $\endgroup$caffein– caffein2018年11月13日 18:29:20 +00:00Commented Nov 13, 2018 at 18:29
1 Answer 1
It will make the algorithm insecure.
It will be become vulnerable to slide attacks.
It will make encryption become equivalent to decryption, which is a weakness. This is sometimes called a "weak key"; with your scheme, every key will be "weak".
It will also reduce the keyspace to 48 bits, which is too small to be secure.