Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash...
13 KB (1,677 words) - 11:30, 9 March 2025
In cryptography, higher-order differential cryptanalysis is a generalization of differential cryptanalysis, an attack used against block ciphers. While...
5 KB (783 words) - 05:19, 26 August 2023
KN-Cipher (section Cryptanalysis)
secure against ordinary differential cryptanalysis, KN-Cipher was later broken using higher order differential cryptanalysis. Presented as "a prototype...
3 KB (200 words) - 18:23, 27 May 2025
In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. Lars Knudsen...
4 KB (318 words) - 10:15, 4 January 2025
impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences...
10 KB (850 words) - 15:40, 7 December 2024
GOST (block cipher) (section Cryptanalysis of GOST)
Courtois; Michał Miształ (2011). "Differential Cryptanalysis of GOST". IACR. Nicolas T. Courtois (2012). "An Improved Differential Attack on Full GOST" (PDF)...
14 KB (1,456 words) - 04:42, 8 June 2025
In cryptography, linear cryptanalysis is a general form of cryptanalysis based on finding affine approximations to the action of a cipher. Attacks have...
6 KB (812 words) - 13:20, 1 November 2023
Spectr-H64 (section Cryptanalysis)
Hong; Sangjin Lee & Jongin Lim (2003). "Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property". Computer Network Security. Springer...
3 KB (282 words) - 08:59, 23 November 2023
PRESENT (section Cryptanalysis)
truncated differential attack on 26 out of 31 rounds of PRESENT was suggested in 2014. Several full-round attacks using biclique cryptanalysis have been...
7 KB (708 words) - 14:48, 26 January 2024
Skipjack (cipher) (section Cryptanalysis)
exhaustive search) within months using impossible differential cryptanalysis. A truncated differential attack was also published against 28 rounds of Skipjack...
12 KB (1,134 words) - 16:36, 18 June 2025
Twofish (section Cryptanalysis)
is a truncated differential cryptanalysis of the full 16-round version. The paper claims that the probability of truncated differentials is 2−57.3 per...
9 KB (827 words) - 14:21, 3 April 2025
cryptography, mod n cryptanalysis is an attack applicable to block and stream ciphers. It is a form of partitioning cryptanalysis that exploits unevenness...
3 KB (412 words) - 17:18, 19 December 2024
XTEA (section Cryptanalysis)
Youngdai; Chang, Donghoon; Lee, Wonil; Lee, Sangjin (2004). "Differential Cryptanalysis of TEA and XTEA". In Lim, JI.; Lee, DH. (eds.). Information Security...
9 KB (969 words) - 14:09, 19 April 2025
• CRHF • Crib (cryptanalysis) • Crowds (anonymity network) • Crypt (C) • Cryptanalysis • Cryptanalysis of the Enigma • Cryptanalysis of the Lorenz cipher...
67 KB (2,932 words) - 23:20, 16 May 2025
Madryga (section Cryptanalysis)
non-linear component, and flaws in them are what both differential cryptanalysis and linear cryptanalysis seek to exploit. While Madryga's rotations are data-dependent...
5 KB (717 words) - 21:33, 16 March 2024
Block cipher (section Differential cryptanalysis)
growing catalog of attacks: truncated differential cryptanalysis, partial differential cryptanalysis, integral cryptanalysis, which encompasses square and integral...
51 KB (6,569 words) - 08:42, 11 April 2025
Prince (cipher) (section Cryptanalysis)
cipher cryptanalysis" (PDF). {{cite journal}}: Cite journal requires |journal= (help) Posteuca, R.; Negara, G. (2015). "Integral cryptanalysis of round-reduced...
13 KB (1,376 words) - 13:37, 2 May 2024
break the cipher in a way that is similar to differential cryptanalysis. The term "rotational cryptanalysis" was coined by Dmitry Khovratovich and Ivica...
3 KB (315 words) - 05:31, 19 February 2025
1994, the differential-linear attack is a mix of both linear cryptanalysis and differential cryptanalysis. The attack utilises a differential characteristic...
4 KB (385 words) - 03:30, 1 February 2024
IDEA NXT). Unlike differential cryptanalysis, which uses pairs of chosen plaintexts with a fixed XOR difference, integral cryptanalysis uses sets or even...
8 KB (716 words) - 10:14, 4 January 2025
cryptanalysis is a form of cryptanalysis for block ciphers. Developed by Carlo Harpes in 1995, the attack is a generalization of linear cryptanalysis...
4 KB (379 words) - 17:07, 23 September 2024
M8 (cipher) (section Cryptanalysis)
cipher to a range of attacks, including differential cryptanalysis, linear cryptanalysis and mod n cryptanalysis. "ISO/IEC9979-0020 Register Entry" (PDF)...
8 KB (1,250 words) - 00:44, 31 August 2024
XXTEA (section Cryptanalysis)
size of 212 bytes or more, and negligible work. It is based on differential cryptanalysis. To cipher "212 bytes or more" algorithm performs just 6 rounds...
9 KB (1,115 words) - 08:11, 28 June 2024
slices. This maximizes parallelism but also allows use of the extensive cryptanalysis work performed on DES. Serpent took a conservative approach to security...
16 KB (1,962 words) - 07:47, 17 April 2025
with less complexity than a brute-force search: differential cryptanalysis (DC), linear cryptanalysis (LC), and Davies' attack. However, the attacks are...
60 KB (6,717 words) - 17:36, 25 May 2025
perfect S-box. S-boxes can be analyzed using linear cryptanalysis and differential cryptanalysis in the form of a Linear approximation table (LAT) or...
10 KB (929 words) - 20:28, 24 May 2025
2013-02-19. Eli Biham, Adi Shamir: Differential Cryptanalysis of Feal and N-Hash. EUROCRYPT 1991: 1–16 Bert den Boer, Cryptanalysis of F.E.A.L., EUROCRYPT 1988:...
5 KB (551 words) - 01:40, 17 October 2023
are not key-dependent, Khafre XORs subkeys every eight rounds. Differential cryptanalysis is effective against Khafre: 16 rounds can be broken using either...
9 KB (839 words) - 12:48, 9 June 2024
schedule plays a part in providing strength against linear and differential cryptanalysis. For toy Feistel ciphers, it was observed that those with complex...
3 KB (402 words) - 08:19, 29 May 2025
Kyungdeok; Lee, Wonil; Lee, Sangjin; Lim, Jongin (2002). "Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA". Fast Software Encryption (PDF)...
13 KB (1,189 words) - 03:44, 16 March 2025