Truncated differential cryptanalysis
From HandWiki
Short description: Form of cryptanalaysis
In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. Lars Knudsen developed the technique in 1994. Whereas ordinary differential cryptanalysis analyzes the full difference between two texts, the truncated variant considers differences that are only partially determined. That is, the attack makes predictions of only some of the bits instead of the full block. This technique has been applied to SAFER, IDEA, Skipjack, E2, Twofish, Camellia, CRYPTON, and even the stream cipher Salsa20.
References
- Lars Knudsen (1994). "Truncated and Higher Order Differentials" (PDF/PostScript). 2nd International Workshop on Fast Software Encryption (FSE 1994). Leuven: Springer-Verlag. pp. 196–211. http://citeseer.ist.psu.edu/knudsen95truncated.html. Retrieved 14 February 2007.
- Lars Knudsen, Thomas Berson (1996). "Truncated Differentials of SAFER" (PDF/PostScript). 3rd International Workshop on Fast Software Encryption (FSE 1996). Cambridge: Springer-Verlag. pp. 15–26. http://citeseer.ist.psu.edu/knudsen96truncated.html. Retrieved 27 February 2007.
- Johan Borst, Lars R. Knudsen, Vincent Rijmen (May 1997). "Two Attacks on Reduced IDEA" (gzipped PostScript). Advances in Cryptology – EUROCRYPT '97. Konstanz: Springer-Verlag. pp. 1–13. http://www.esat.kuleuven.ac.be/~rijmen/downloadable/rijmen/idea.ps.gz. Retrieved 8 March 2007.
- Lars Knudsen, M.J.B. Robshaw, David Wagner (1999). "Truncated Differentials and Skipjack" (PostScript). Advances in Cryptology – CRYPTO '99. Santa Barbara, California: Springer-Verlag. pp. 165–180. http://www.windowsecurity.com/uplarticle/4/skipjack-crypto99.ps. Retrieved 27 February 2007.
- M. Matsui, T. Tokita (1999). "Cryptanalysis of a Reduced Version of the Block Cipher E2" (PDF). 6th International Workshop on Fast Software Encryption (FSE 1999). Rome: Springer-Verlag. pp. 71–80. http://maths.utime.cn:81/Crypt1998-2003/bibs/1636/16360071.htm. Retrieved 27 February 2007.
- . 2000. http://www.schneier.com/twofish-analysis-shiho.pdf. Retrieved 27 February 2007.
- Crowley, Paul (2006). "Truncated differential cryptanalysis of five rounds of Salsa20". http://www.ciphergoth.org/crypto/salsa20.
Original source: https://en.wikipedia.org/wiki/Truncated differential cryptanalysis.
Read more |