Differential cryptanalysis: Difference between revisions

Content deleted Content added
m spacing correction and tense change
Line 7:
 
While DES was designed with resistance to differential cryptanalysis in mind, other contemporary ciphers proved to be vulnerable. An early target for the attack was the [[FEAL]] block cipher. The original proposed version with four rounds (FEAL-4) can be broken using only eight [[Chosen-plaintext attack|chosen plaintexts]], and even a 31-round version of FEAL is susceptible to the attack. In contrast, the scheme can successfully cryptanalyze DES with an effort on the order 2<sup>47</sup> chosen plaintexts.
123
 
==Attack mechanics==