218
edits
As of August 2020 the site you are on (wiki.newae.com) is deprecated, and content is now at rtfm.newae.com. |
Changes
no edit summary
Note that the attack attemps to recover the first round subkey, which only have 48bits, while the original key has 54 significant bits (64 we count the parity bits that are irrelevant). So, if we map the first round subkey, obtained after the attack, to the original key (you can use the provided DES Key Schedule Tool to do it), there will still be 8 bits missing (256 combinations).
[[File:deskeyschedulecalc.png|400px]]