Differential cryptanalysis: Difference between revisions

Content deleted Content added
consistent citation formatting; templated citesate
Alter: date, pages, chapter-url. URLs might have been anonymized. Add: archive-date, archive-url, isbn, s2cid. Formatted dashes. | Use this tool. Report bugs. | #UCB_Gadget
Line 20:
For any particular cipher, the input difference must be carefully selected for the attack to be successful. An analysis of the algorithm's internals is undertaken; the standard method is to trace a path of highly probable differences through the various stages of encryption, termed a ''differential characteristic''.
 
Since differential cryptanalysis became public knowledge, it has become a basic concern of cipher designers. New designs are expected to be accompanied by evidence that the algorithm is resistant to this attack and many including the [[Advanced Encryption Standard]], have been [[Mathematical proof|proven]] secure against the attack.<ref>{{cite journal | vauthors = Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E | title = Report on the Development of the Advanced Encryption Standard (AES) | journal = Journal of Research of the National Institute of Standards and Technology | volume = 106 | issue = 3 | pages = 511–577 | date = May-JuneMay–June 2001 | pmid = 27500035 | pmc = 4863838 | doi = 10.6028/jres.106.023 | id = 3.2.1.3 }}</ref>
 
==Attack in detail==
Line 51:
== Further reading ==
{{Refbegin}}
* {{cite journal | vauthors = Biham E, Shamir A | title = Differential cryptanalysis of DES-like cryptosystems. | journal = Journal of Cryptology | date = January 1991 | volume = 4 | issue = 1 | pages = 3-723–72 | doi = 10.1007/BF00630563 | s2cid = 33202054 }}
* {{cite book | vauthors = Biham E, Shamir A | chapter = Differential cryptanalysis of the full 16-round DES. | title = Annual International Cryptology Conference | date = August 1992 | pages = 487-496487–496 | publisher = Springer | ___location = Berlin, Heidelberg | doi = 10.1007/3-540-48071-4_34 | series = Lecture Notes in Computer Science | volume = 740 | chapterisbn = 978-3-540-57340-1 | s2cid = 6188138 | archive-url = https://web.archive.org/web/20050405183302/http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1991/CS/CS0708.ps | archive-date = 2005-04-05 | chapter-url = http://www.cs.technion.ac.il/users/wwwb/cgi-bin/tr-get.cgi/1991/CS/CS0708.ps }}
 
== External links ==