Mod n cryptanalysis: Difference between revisions

Content deleted Content added
Citation bot (talk | contribs)
Removed parameters. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_webform 1456/2002
{{Mvar}}
 
(One intermediate revision by one other user not shown)
Line 1:
{{DISPLAYTITLE:Mod {{Mvar|n}} cryptanalysis}}
{{Short description|Attack applicable to block and stream ciphers}}
{{no footnotes|date=August 2017}}
In [[cryptography]], '''mod ''{{Mvar|n''}} cryptanalysis''' is an [[cryptanalysis|attack]] applicable to [[block cipher|block]] and [[stream cipher]]s. It is a form of [[partitioning cryptanalysis]] that exploits unevenness in how the [[cipher]] operates over [[equivalence class]]es (congruence classes) [[modular arithmetic|modulo ''{{Mvar|n''}}]]. The method was first suggested in 1999 by [[John Kelsey (cryptanalyst)|John Kelsey]], [[Bruce Schneier]], and [[David A. Wagner|David Wagner]] and applied to RC5P (a variant of [[RC5]]) and [[M6 (cipher)|M6]] (a family of block ciphers used in the [[FireWire]] standard). These attacks used the properties of binary addition and bit rotation modulo a [[Fermat prime]].
 
==Mod 3 analysis of RC5P==