Risk Assessment of the 3Des in ERTMS

被引:5
|
作者
Pepin, Florent [1 ]
Vigliotti, Maria Grazia [1 ]
机构
[1] RSSB, 1 South Pl, London EC2M, England
关键词
3Des; ERTMS; Railway systems; Performance analysis; Key management; Key distribution;
D O I
10.1007/978-3-319-33951-1_6
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The three-key Triple Data Encryption Algorithm (Triple Data Encryption Algorithm is also known in the literature as Triple-Des, or Triple DEA or TDEA) (3Des) is a symmetric encryption algorithm currently used in the European Traffic Management System (ERTMS) for integrity and authentication purposes. In a recent publication [1], 3Des has been withdrawn in favour of Advanced Encryption Standard (AES) [2] (The National Institute for Science and Technology (NIST) standard [1] allows to both algorithms can be used for specific purposes until 2030 with the intention of gradually phasing out 3Des towards AES). In this paper, we have investigated, from a practical point of view, known attacks to 3Des and proved that, in order to carry out such attacks, a disproportionate amount of hardware and money would be necessary. In practical terms this means that these attacks do not represent a realistic risk.
引用
收藏
页码:79 / 92
页数:14
相关论文
共 50 条
  • [1] GPU accelerated 3DES encryption
    Altinok, Kaan Furkan
    Peker, Afsin
    Tezcan, Cihangir
    Temizel, Alptekin
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (09):
  • [2] A reconfigurable architecture for accelerating DES, 3DES and AES
    Gao, N
    Wang, Q
    Li, ZC
    [J]. Proceedings of the 11th Joint International Computer Conference, 2005, : 474 - 477
  • [3] 3DES Implementation Based on FPGA
    Ren, Fang
    Chen, Leihua
    Zhang, Tao
    [J]. EMERGING RESEARCH IN WEB INFORMATION SYSTEMS AND MINING, 2011, 238 : 218 - +
  • [4] Applying 3DES to Chaotic Synchronization Cryptosystems
    Hsiao, Feng-Hsiag
    [J]. IEEE ACCESS, 2022, 10 : 1036 - 1050
  • [5] A Comparison of the 3DES and AES Encryption Standards
    Aleisa, Noura
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (07): : 241 - 246
  • [6] 3DES算法原理与设计
    邓悦恒
    [J]. 电脑知识与技术, 2011, 7 (20) : 4817 - 4818
  • [7] DeCrypt: a 3DES inspired optimised cryptographic algorithm
    Chowdhury D.
    Dey A.
    Garai R.
    Adhikary S.
    Dwivedi A.D.
    Ghosh U.
    Alnumay W.S.
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 (05) : 4745 - 4755
  • [8] 3DES IP的小面积实现
    孙坚
    周玉洁
    [J]. 信息安全与通信保密, 2006, (12) : 136 - 138
  • [9] Reconfigurable architecture for high-speed implementations of DES, 3DES and AES
    Gao, Na-Na
    Li, Zhan-Cai
    Wang, Qin
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2006, 34 (08): : 1386 - 1390
  • [10] A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
    Patil, Priyadarshini
    Narayankar, Prashant
    Narayan, D. G.
    Meena, S. M.
    [J]. 1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 : 617 - 624