Eurocrypt '94

Bruce Schneier

In the cryptographic world--at least, the cryptographic world outside the military--there are two major annual conferences: Crypto and Eurocrypt. Eurocrypt '94, held in Perugia, Italy, in mid-May, had an attendance of approximately 300, representing the best in academic cryptography from five continents. A total of 37 papers were presented at the main session, with another 20 or so at an informal "rump session" one evening.

Much of what was presented was very theoretical and only of marginal use to front-line programmers actually implementing such things. Still, I found the following both useful and important:

Among the interesting papers presented at the rump session were Biham's, showing that triple-DES in cipher-feedback mode, with triple-DES as the block cipher, is more secure than a large number of variant possibilities. Knudsen found a class of "weak" keys for DES and LOKI when those algorithms are used as one-way hash functions. However, there is really nothing to worry about; the odds of picking such a key at random is very small. Charnes and O'Connor presented some initial comments on the GOST algorithm, an encryption algorithm from the Soviet Union.

The side discussions were also interesting. At least two cryptographers are working on something called "higher-order differential cryptanalysis." Although this technique has had great success against DES with only 5 rounds, no one knows how to extend it to a full 16-round DES. One cryptographer has developed an alternate set of DES S-boxes that is resistant to both differential and linear cryptanalysis, while another has developed a method for generating key-dependent S-boxes that increase the effective key size of DES beyond 56 bits. If there are going to be any more attacks against DES, this--and Hellman's attempts to combine differential and linear cryptanalysis--is where you'll want to be watching.

RSA-129 was recently factored. This is the 129-digit number, the product of two large primes, that was featured in Martin Gardner's seminal Scientific American column (August 1977) about the RSA algorithm. Although this doesn't affect the security of the 1024-bit numbers used in programs such as PGP, it does show how far we've come in 15 years. Gardner was sure this number would not be factored for millions of years.

The other big news is a security problem with the Secure Hash Algorithm (SHA); see "The Secure Hash Algorithm" by William Stallings, DDJ, April 1994. NSA cryptographers acknowledge they've found a problem with the algorithm, but they won't tell anyone what, or even how serious, it is. Still, they promise a fix really soon now. Expect that fix to be secret, too. We're all waiting with bated breath.