Content deleted Content added
Added {{no footnotes}} tag to article (TW) |
{{Mvar}} |
||
(5 intermediate revisions by 4 users not shown) | |||
Line 1:
{{DISPLAYTITLE:Mod {{Mvar|n}} cryptanalysis}}
{{Short description|Attack applicable to block and stream ciphers}}
{{no footnotes|date=August 2017}}
In [[cryptography]], '''mod
==Mod 3 analysis of RC5P==
Line 11 ⟶ 13:
: <math>2^{32} \equiv 1\pmod 3,\,</math>
: <math>X \lll 1 \equiv 2X\pmod 3.</math>
Thus left rotation by a single bit has a simple description modulo 3. Analysis of other operations (data dependent rotation and modular addition) reveals similar, notable biases. Although there are some theoretical problems analysing the operations in combination, the bias can be detected experimentally for the entire cipher. In (Kelsey et al., 1999), experiments were conducted up to seven rounds, and based on this they conjecture that as many as
Against M6 there are attacks mod 5 and mod 257 that are even more effective.
Line 30 ⟶ 32:
| url = http://www.schneier.com/paper-mod3.html
| format = [[PDF]]/[[PostScript]]
|
* {{cite journal
| author = [[Vincent Rijmen]]
Line 38 ⟶ 40:
| date = 2003-12-01
| url = http://www.cryptico.com/Files/filer/wp_modn_analysis.pdf
|
* {{cite journal
|author1=Toshio Tokita |author2=Tsutomu Matsumoto | title = On Applicability of Differential Cryptanalysis, Linear Cryptanalysis and Mod n Cryptanalysis to an Encryption Algorithm [[M8 (cipher)|M8]] (ISO9979-20)
|