7. Security
No weak keys, no complementary properties ( refer to the
key schedule )
A matching-ciphertext attack requires about 2^(70)
chosen plaintexts and 2^(121) DES-encryptions
Security of DEAL is based on DES, which has been tested
for 20 years
Previous slide
Next slide
Back to first slide
View graphic version