Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Install
Faster access than browser!
 

Differential cryptanalysis

Index Differential cryptanalysis

Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. [1]

34 relations: Adi Shamir, Advanced Encryption Standard, Affine transformation, Bit numbering, Block cipher, Boolean satisfiability problem, Boomerang attack, Brute-force attack, Chosen-plaintext attack, Cipher, Ciphertext-only attack, Cryptanalysis, Cryptography, Cryptography newsgroups, Data Encryption Standard, Don Coppersmith, Eli Biham, Encryption, Exclusive or, FEAL, Higher-order differential cryptanalysis, Impossible differential cryptanalysis, Known-plaintext attack, Linear cryptanalysis, Mathematical proof, MISTY1, National Security Agency, Penguin Books, Plaintext, Randomness, S-box, Steven Levy, Subtraction, Truncated differential cryptanalysis.

Adi Shamir

Adi Shamir (עדי שמיר; born July 6, 1952) is an Israeli cryptographer.

New!!: Differential cryptanalysis and Adi Shamir · See more »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: Differential cryptanalysis and Advanced Encryption Standard · See more »

Affine transformation

In geometry, an affine transformation, affine mapBerger, Marcel (1987), p. 38.

New!!: Differential cryptanalysis and Affine transformation · See more »

Bit numbering

In computing, bit numbering (or sometimes bit endianness) is the convention used to identify the bit positions in a binary number or a container for such a value.

New!!: Differential cryptanalysis and Bit numbering · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: Differential cryptanalysis and Block cipher · See more »

Boolean satisfiability problem

In computer science, the Boolean satisfiability problem (sometimes called propositional satisfiability problem and abbreviated as SATISFIABILITY or SAT) is the problem of determining if there exists an interpretation that satisfies a given Boolean formula.

New!!: Differential cryptanalysis and Boolean satisfiability problem · See more »

Boomerang attack

In cryptography, the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis.

New!!: Differential cryptanalysis and Boomerang attack · See more »

Brute-force attack

In cryptography, a brute-force attack consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly.

New!!: Differential cryptanalysis and Brute-force attack · See more »

Chosen-plaintext attack

A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.

New!!: Differential cryptanalysis and Chosen-plaintext attack · See more »

Cipher

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure.

New!!: Differential cryptanalysis and Cipher · See more »

Ciphertext-only attack

In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts.

New!!: Differential cryptanalysis and Ciphertext-only attack · See more »

Cryptanalysis

Cryptanalysis (from the Greek kryptós, "hidden", and analýein, "to loosen" or "to untie") is the study of analyzing information systems in order to study the hidden aspects of the systems.

New!!: Differential cryptanalysis and Cryptanalysis · See more »

Cryptography

Cryptography or cryptology (from κρυπτός|translit.

New!!: Differential cryptanalysis and Cryptography · See more »

Cryptography newsgroups

There are several newsgroups relevant for discussions about cryptography and related issues.

New!!: Differential cryptanalysis and Cryptography newsgroups · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: Differential cryptanalysis and Data Encryption Standard · See more »

Don Coppersmith

Don Coppersmith (born 1950) is a cryptographer and mathematician.

New!!: Differential cryptanalysis and Don Coppersmith · See more »

Eli Biham

Eli Biham (אלי ביהם) is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department.

New!!: Differential cryptanalysis and Eli Biham · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: Differential cryptanalysis and Encryption · See more »

Exclusive or

Exclusive or or exclusive disjunction is a logical operation that outputs true only when inputs differ (one is true, the other is false).

New!!: Differential cryptanalysis and Exclusive or · See more »

FEAL

In cryptography, FEAL (the Fast data Encipherment ALgorithm) is a block cipher proposed as an alternative to the Data Encryption Standard (DES), and designed to be much faster in software.

New!!: Differential cryptanalysis and FEAL · See more »

Higher-order differential cryptanalysis

In cryptography, higher-order differential cryptanalysis is a generalization of differential cryptanalysis, an attack used against block ciphers.

New!!: Differential cryptanalysis and Higher-order differential cryptanalysis · See more »

Impossible differential cryptanalysis

In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers.

New!!: Differential cryptanalysis and Impossible differential cryptanalysis · See more »

Known-plaintext attack

The known-plaintext attack (KPA) is an attack model for cryptanalysis where the attacker has access to both the plaintext (called a crib), and its encrypted version (ciphertext).

New!!: Differential cryptanalysis and Known-plaintext attack · See more »

Linear cryptanalysis

In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher.

New!!: Differential cryptanalysis and Linear cryptanalysis · See more »

Mathematical proof

In mathematics, a proof is an inferential argument for a mathematical statement.

New!!: Differential cryptanalysis and Mathematical proof · See more »

MISTY1

In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric.

New!!: Differential cryptanalysis and MISTY1 · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: Differential cryptanalysis and National Security Agency · See more »

Penguin Books

Penguin Books is a British publishing house.

New!!: Differential cryptanalysis and Penguin Books · See more »

Plaintext

In cryptography, plaintext or cleartext is unencrypted information, as opposed to information encrypted for storage or transmission.

New!!: Differential cryptanalysis and Plaintext · See more »

Randomness

Randomness is the lack of pattern or predictability in events.

New!!: Differential cryptanalysis and Randomness · See more »

S-box

In cryptography, an S-box (substitution-box) is a basic component of symmetric key algorithms which performs substitution.

New!!: Differential cryptanalysis and S-box · See more »

Steven Levy

Steven Levy (born 1951) is an American journalist who has written several books on computers, technology, cryptography, the internet, cybersecurity, and privacy.

New!!: Differential cryptanalysis and Steven Levy · See more »

Subtraction

Subtraction is an arithmetic operation that represents the operation of removing objects from a collection.

New!!: Differential cryptanalysis and Subtraction · See more »

Truncated differential cryptanalysis

In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers.

New!!: Differential cryptanalysis and Truncated differential cryptanalysis · See more »

Redirects here:

Degenerate Key, Differential Cryptanalysis, Differential attack, Differential attacks, T-attack, Tickle attack.

References

[1] https://en.wikipedia.org/wiki/Differential_cryptanalysis

OutgoingIncoming
Hey! We are on Facebook now! »