• Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash...
    13 KB (1,677 words) - 11:30, 9 March 2025
  • In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. Lars Knudsen...
    4 KB (318 words) - 10:15, 4 January 2025
  • Thumbnail for Twofish
    cipher is a truncated differential cryptanalysis of the full 16-round version. The paper claims that the probability of truncated differentials is 2−57.3...
    9 KB (827 words) - 14:21, 3 April 2025
  • Seokhie; Lee, Sangjin; Lim, Jongin; Yoon, Seonhee (2001). "Truncated differential cryptanalysis of Camellia". In Kim, Kwangjo (ed.). Information Security...
    18 KB (1,805 words) - 21:49, 19 June 2025
  • growing catalog of attacks: truncated differential cryptanalysis, partial differential cryptanalysis, integral cryptanalysis, which encompasses square and...
    51 KB (6,565 words) - 20:31, 1 August 2025
  • Thumbnail for Salsa20
    "most interesting Salsa20 cryptanalysis". This attack and all subsequent attacks are based on truncated differential cryptanalysis. In 2006, Fischer, Meier...
    32 KB (3,624 words) - 17:22, 25 June 2025
  • exhaustive search) within months using impossible differential cryptanalysis. A truncated differential attack was also published against 28 rounds of Skipjack...
    12 KB (1,134 words) - 16:36, 18 June 2025
  • higher-order differential cryptanalysis is a generalization of differential cryptanalysis, an attack used against block ciphers. While in standard differential cryptanalysis...
    5 KB (783 words) - 05:19, 26 August 2023
  • impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences...
    10 KB (850 words) - 15:40, 7 December 2024
  • A truncated differential attack on 26 out of 31 rounds of PRESENT was suggested in 2014. Several full-round attacks using biclique cryptanalysis have...
    7 KB (708 words) - 14:48, 26 January 2024
  • Thumbnail for Data Encryption Standard
    with less complexity than a brute-force search: differential cryptanalysis (DC), linear cryptanalysis (LC), and Davies' attack. However, the attacks are...
    60 KB (6,717 words) - 14:31, 5 July 2025
  • Thumbnail for XTEA
    XTEA (section Cryptanalysis)
    Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin (2004). "Differential Cryptanalysis of TEA and XTEA". In Lim, JI.; Lee, DH. (eds.). Information Security...
    9 KB (969 words) - 14:09, 19 April 2025
  • Thumbnail for XXTEA
    XXTEA (section Cryptanalysis)
    size of 212 bytes or more, and negligible work. It is based on differential cryptanalysis. To cipher "212 bytes or more" algorithm performs just 6 rounds...
    9 KB (1,115 words) - 08:11, 28 June 2024
  • 1994, the differential-linear attack is a mix of both linear cryptanalysis and differential cryptanalysis. The attack utilises a differential characteristic...
    4 KB (385 words) - 03:30, 1 February 2024
  • In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher. Attacks have...
    6 KB (812 words) - 13:20, 1 November 2023
  • cryptography, mod n cryptanalysis is an attack applicable to block and stream ciphers. It is a form of partitioning cryptanalysis that exploits unevenness...
    3 KB (412 words) - 17:18, 19 December 2024
  • Hong; Sangjin Lee & Jongin Lim (2003). "Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property". Computer Network Security. Springer...
    3 KB (282 words) - 08:59, 23 November 2023
  • Science. 16. Zhao, G.; Sun, B.; Li, C.; Su, J. (2015). "Truncated differential cryptanalysis of PRINCE". Security and Communication Networks. 8 (16):...
    13 KB (1,376 words) - 13:37, 2 May 2024
  • break the cipher in a way that is similar to differential cryptanalysis. The term "rotational cryptanalysis" was coined by Dmitry Khovratovich and Ivica...
    3 KB (315 words) - 05:31, 19 February 2025
  • IDEA NXT). Unlike differential cryptanalysis, which uses pairs of chosen plaintexts with a fixed XOR difference, integral cryptanalysis uses sets or even...
    8 KB (713 words) - 13:30, 10 July 2025
  • Thumbnail for Speck (cipher)
    Speck in the standard attack model (CPA/CCA with unknown key) are differential cryptanalysis attacks; these make it through about 70–75% of the rounds of most...
    23 KB (2,411 words) - 07:38, 25 May 2025
  • rotated 56 bits for use in the next two rounds. Only a small amount of cryptanalysis has been published on NewDES. The designer showed that NewDES exhibits...
    5 KB (576 words) - 02:19, 15 April 2024
  • Thumbnail for MacGuffin (cipher)
    introduced, Rijmen and Preneel showed that it was vulnerable to differential cryptanalysis. They showed that 32 rounds of MacGuffin is weaker than 16 rounds...
    4 KB (470 words) - 19:24, 4 May 2024
  • Thumbnail for GOST (block cipher)
    Courtois; Michał Miształ (2011). "Differential Cryptanalysis of GOST". IACR. Nicolas T. Courtois (2012). "An Improved Differential Attack on Full GOST" (PDF)...
    14 KB (1,469 words) - 19:58, 18 July 2025
  • cipher to a range of attacks, including differential cryptanalysis, linear cryptanalysis and mod n cryptanalysis. "ISO/IEC9979-0020 Register Entry" (PDF)...
    8 KB (1,250 words) - 00:44, 31 August 2024
  • Thumbnail for Boomerang attack
    the boomerang attack is a method for the cryptanalysis of block ciphers based on differential cryptanalysis. The attack was published in 1999 by David...
    9 KB (864 words) - 04:16, 17 October 2023
  • non-linear component, and flaws in them are what both differential cryptanalysis and linear cryptanalysis seek to exploit. While Madryga's rotations are data-dependent...
    5 KB (717 words) - 21:33, 16 March 2024
  • Thumbnail for LOKI97
    1999). It was found to be susceptible to an effective theoretical differential cryptanalysis attack considerably faster than an exhaustive search. LOKI Advanced...
    4 KB (412 words) - 07:03, 27 April 2022
  • Thumbnail for Cryptography
    Standard for cryptography. DES was designed to be resistant to differential cryptanalysis, a powerful and general cryptanalytic technique known to the NSA...
    101 KB (11,138 words) - 15:26, 1 August 2025
  • • CRHF • Crib (cryptanalysis) • Crowds (anonymity network) • Crypt (C) • CryptanalysisCryptanalysis of the Enigma • Cryptanalysis of the Lorenz cipher...
    66 KB (2,911 words) - 02:58, 27 July 2025