Published May 7, 1999
| Published + Submitted
Journal Article
Open
On Applying Molecular Computation to the Data Encryption Standard
Abstract
Recently, Boneh, Dunworth, and Lipton (1996) described the potential use of molecular computation in attacking the United States Data Encryption Standard (DES), Here, we provide a description of such an attack using the sticker model of molecular computation. Our analysis suggests that such an attack might be mounted on a tabletop machine using approximately a gram of DNA and might succeed even in the presence of a large number of errors.
Additional Information
© 1999 Mary Ann Liebert, Inc. Received for publication November 9, 1997; accepted as revised October 18, 1998. L.M.A. and P.W.K.R. are supported in part by the National Science Foundation under grant CCR-9403662 and the Sloan Foundation. S.R. is supported in part by the Center for Neuromorphic Systems Engineering as a part of the National Science Foundation Engineering Research Center Program under grant EEC-9402726 and by the Natural Sciences and Engineering Research Council of Canada. E.W. is supported in part by National Institute for Mental Health (NIMH) training grant no. 5 T32 MH 19138-06 and also by General Motors' Technology Research Partnerships program.Attached Files
Published - Stickers_DES1999.pdf
Submitted - des_1_.pdf
Files
Stickers_DES1999.pdf
Files
(944.8 kB)
Name | Size | Download all |
---|---|---|
md5:cbb16e58d1e6766f84b79160e475e9f1
|
770.8 kB | Preview Download |
md5:8245ca979a62b75780b29f0ecce0668b
|
174.0 kB | Preview Download |
Additional details
- Eprint ID
- 22777
- Resolver ID
- CaltechAUTHORS:20110309-104205166
- NSF
- CCR-9403662
- Alfred P. Sloan Foundation
- NSF
- EEC-9402726
- Natural Sciences and Engineering Research Council of Canada (NSERC)
- National Institute for Mental Health (NIMH)
- 5 T32 MH 19138-06
- General Motors Technology Research Partnership Program
- Created
-
2011-03-10Created from EPrint's datestamp field
- Updated
-
2021-11-09Created from EPrint's last_modified field