Content deleted Content added
consistent citation formatting; templated citesate |
Alter: date, pages, chapter-url. URLs might have been anonymized. Add: archive-date, archive-url, isbn, s2cid. Formatted dashes. | Use this tool. Report bugs. | #UCB_Gadget |
||
Line 20:
For any particular cipher, the input difference must be carefully selected for the attack to be successful. An analysis of the algorithm's internals is undertaken; the standard method is to trace a path of highly probable differences through the various stages of encryption, termed a ''differential characteristic''.
Since differential cryptanalysis became public knowledge, it has become a basic concern of cipher designers. New designs are expected to be accompanied by evidence that the algorithm is resistant to this attack and many including the [[Advanced Encryption Standard]], have been [[Mathematical proof|proven]] secure against the attack.<ref>{{cite journal | vauthors = Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E | title = Report on the Development of the Advanced Encryption Standard (AES) | journal = Journal of Research of the National Institute of Standards and Technology | volume = 106 | issue = 3 | pages = 511–577 | date =
==Attack in detail==
Line 51:
== Further reading ==
{{Refbegin}}
* {{cite journal | vauthors = Biham E, Shamir A | title = Differential cryptanalysis of DES-like cryptosystems. | journal = Journal of Cryptology | date = January 1991 | volume = 4 | issue = 1 | pages =
* {{cite book | vauthors = Biham E, Shamir A | chapter = Differential cryptanalysis of the full 16-round DES. | title = Annual International Cryptology Conference | date = August 1992 | pages =
== External links ==
|