Your IP: 3.233.215.231 United States Near: United States

Lookup IP Information

Previous 1 2 3 4 5 6 7 8 

Below is the list of all allocated IP address in 167.244.0.0 - 167.244.255.255 network range, sorted by latency.

Ladder-DES General Designers Terry Ritter First published February 22, 1994 Derived from DES Related to DEAL Cipher detail Key sizes 224 bits Block sizes 128 bits Structure Nested Feistel network Rounds 4 Best public cryptanalysis Eli Biham's attacks require 236 plaintext-ciphertext pairs In cryptography, Ladder-DES is a block cipher designed in 1994 by Terry Ritter. It is a 4-round Feistel cipher with a block size of 128 bits, using DES as the round function. It has no actual key schedule, so the total key size is 4×56=224 bits. In 1997, Eli Biham found two forms of cryptanalysis for Ladder-DES that depend on the birthday paradox; the key is deduced from the presence or absence of collisions, plaintexts that give equal intermediate values in the encryption process. He presented both a chosen-plaintext attack and a known-plaintext attack; each uses about 236 plaintexts and 290 work, but the known-plaintext attack requires much more memory. References Terry Ritter (22 February 1994). "Ladder DES". sci.crypt. (Web link). Retrieved 30 January 2007. Eli Biham (1997). "Cryptanalysis of Ladder-DES" (PDF). 4th International Workshop on Fast Software Encryption (FSE '97). Haifa: Springer-Verlag. pp. 134–138. http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1997/CS/CS0890.pdf. Retrieved 30 January 2007.  v · d · e Block ciphers (security summary) Common algorithms AES · Blowfish · DES · Triple DES · Serpent · Twofish Less common algorithms Camellia · CAST-128 · IDEA · RC2 · RC5 · SEED · Skipjack · TEA · XTEA Other algorithms 3-Way · ABC · Akelarre · Anubis · ARIA · BaseKing · BassOmatic · BATON · BEAR and LION · CAST-256 · CIKS-1 · CIPHERUNICORN-A · CIPHERUNICORN-E · CLEFIA · CMEA · Cobra · COCONUT98 · Crab · Cryptomeria/C2 · CRYPTON · CS-Cipher · DEAL · DES-X · DFC · E2 · FEAL · FEA-M · FROG · G-DES · GOST · Grand Cru · Hasty Pudding cipher · Hierocrypt · ICE · IDEA NXT · Intel Cascade Cipher · Iraqi · KASUMI · KeeLoq · KHAZAD · Khufu and Khafre · KN-Cipher · Ladder-DES · Libelle · LOKI97 · LOKI89/91 · Lucifer · M6 · M8 · MacGuffin · Madryga · MAGENTA · MARS · Mercy · MESH · MISTY1 · MMB · MULTI2 · MultiSwap · New Data Seal · NewDES · Nimbus · NOEKEON · NUSH · Q · RC6 · REDOC · Red Pike · S-1 · SAFER · SAVILLE · SC2000 · SHACAL · SHARK · SMS4 · Spectr-H64 · Square · SXAL/MBAL · Threefish · Treyfer · UES · Xenon · xmx · XXTEA · Zodiac Design Feistel network · Key schedule · Product cipher · S-box · P-box · SPN Attack (cryptanalysis) Brute force · Linear · Differential (Impossible · Truncated) · Integral · Boomerang · Mod n · Related-key · Slide · Rotational · Timing · XSL Standardization AES process · CRYPTREC · NESSIE Misc Avalanche effect · Block size · Initialization vector · Key size · Modes of operation · Padding · Piling-up lemma · Weak key · EFF DES cracker · Key whitening v · d · e Cryptography History of cryptography · Cryptanalysis · Cryptography portal · Outline of cryptography Symmetric-key algorithm · Block cipher · Stream cipher · Public-key cryptography · Cryptographic hash function · Message authentication code · Random numbers · Steganography This cryptography-related article is a stub. You can help Wikipedia by expanding it.v · d · e