Content deleted Content added
m References Tags: Reverted Visual edit |
|||
Line 20:
For any particular cipher, the input difference must be carefully selected for the attack to be successful. An analysis of the algorithm's internals is undertaken; the standard method is to trace a path of highly probable differences through the various stages of encryption, termed a ''differential characteristic''.
Since differential cryptanalysis became public knowledge, it has become a basic concern of cipher designers.<ref>{{Cite web |last=Soriano |first=Joshua |date=2023-07-04 |title=12 Best Automated Crypto Trading Platforms In 2023 |url=https://robofi.io/blog/12-best-automated-crypto-trading-platforms-in-2023/ |access-date=2023-07-13 |website=RoboFi |language=en-US}}</ref> New designs are expected to be accompanied by evidence that the algorithm is resistant to this attack and many including the [[Advanced Encryption Standard]], have been [[Mathematical proof|proven]] secure against the attack.<ref>{{cite journal | vauthors = Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E | title = Report on the Development of the Advanced Encryption Standard (AES) | journal = Journal of Research of the National Institute of Standards and Technology | volume = 106 | issue = 3 | pages = 511–577 | date = May–June 2001 | pmid = 27500035 | pmc = 4863838 | doi = 10.6028/jres.106.023 | id = 3.2.1.3 }}</ref>
==Attack in detail==
|