enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Linear cryptanalysis - Wikipedia

    en.wikipedia.org/wiki/Linear_cryptanalysis

    In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher. Attacks have been developed for block ciphers and stream ciphers. Linear cryptanalysis is one of the two most widely used attacks on block ciphers; the other being differential cryptanalysis.

  3. Piling-up lemma - Wikipedia

    en.wikipedia.org/wiki/Piling-up_lemma

    In cryptanalysis, the piling-up lemma is a principle used in linear cryptanalysis to construct linear approximations to the action of block ciphers.It was introduced by Mitsuru Matsui (1993) as an analytical tool for linear cryptanalysis. [1]

  4. Data Encryption Standard - Wikipedia

    en.wikipedia.org/wiki/Data_Encryption_Standard

    Another theoretical attack, linear cryptanalysis, was published in 1994, but it was the Electronic Frontier Foundation's DES cracker in 1998 that demonstrated that DES could be attacked very practically, and highlighted the need for a replacement algorithm. These and other methods of cryptanalysis are discussed in more detail later in this article.

  5. FEAL - Wikipedia

    en.wikipedia.org/wiki/FEAL

    The cipher is susceptible to various forms of cryptanalysis, and has acted as a catalyst in the discovery of differential and linear cryptanalysis. There have been several different revisions of FEAL, though all are Feistel ciphers , and make use of the same basic round function and operate on a 64-bit block .

  6. Interpolation attack - Wikipedia

    en.wikipedia.org/wiki/Interpolation_attack

    The cipher is resistant against differential and linear cryptanalysis after a small number of rounds. However it was broken in 1996 by Thomas Jakobsen and Lars Knudsen, using interpolation attack. Denote by SHARK ( n , m , r ) {\displaystyle (n,m,r)} a version of SHARK with block size n m {\displaystyle nm} bits using n {\displaystyle n ...

  7. Differential-linear attack - Wikipedia

    en.wikipedia.org/wiki/Differential-linear_attack

    Introduced by Martin Hellman and Susan K. Langford in 1994, the differential-linear attack is a mix of both linear cryptanalysis and differential cryptanalysis.. The attack utilises a differential characteristic over part of the cipher with a probability of 1 (for a few rounds—this probability would be much lower for the whole cipher).

  8. Cipher security summary - Wikipedia

    en.wikipedia.org/wiki/Cipher_security_summary

    Linear cryptanalysis. [6] Serpent-192 2 192: 11 of 32 rounds (2 187 time, 2 118 data) Serpent-256 2 256: DES: 2 56: 2 39 – 2 43 time, 2 43 known plaintexts: 2001 Linear cryptanalysis. [7] In addition, broken by brute force in 2 56 time, no later than 1998-07-17, see EFF DES cracker. [8] Cracking hardware is available for purchase since 2006 ...

  9. Decorrelation theory - Wikipedia

    en.wikipedia.org/wiki/Decorrelation_theory

    In cryptography, decorrelation theory is a system developed by Serge Vaudenay in 1998 [1] for designing block ciphers to be provably secure against differential cryptanalysis, linear cryptanalysis, [2] and even undiscovered cryptanalytic attacks meeting certain broad criteria.