Jump to content

Truncated differential cryptanalysis

From Wikipedia, the free encyclopedia
This is an old revision of this page, as edited by Mikemaori (talk | contribs) at 07:54, 11 January 2010 (Rewrote the link). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack against block ciphers. Lars Knudsen developed the technique in 1994. Whereas ordinary differential cryptanalysis analyzes the full difference between two texts, the truncated variant considers differences that are only partially determined. It has been applied to SAFER, IDEA, Skipjack, E2, Twofish, Camellia, CRYPTON, and even the stream cipher Salsa20.

References

  • Lars Knudsen (1994). "Truncated and Higher Order Differentials" (PDF/PostScript). 2nd International Workshop on Fast Software Encryption (FSE 1994). Leuven: Springer-Verlag. pp. pp.196–211. Retrieved 2007-02-14. {{cite conference}}: |pages= has extra text (help); Unknown parameter |booktitle= ignored (|book-title= suggested) (help)
  • Lars Knudsen, Thomas Berson (1996). "Truncated Differentials of SAFER" (PDF/PostScript). 3rd International Workshop on Fast Software Encryption (FSE 1996). Cambridge: Springer-Verlag. pp. pp.15–26. Retrieved 2007-02-27. {{cite conference}}: |pages= has extra text (help); Unknown parameter |booktitle= ignored (|book-title= suggested) (help)
  • Johan Borst, Lars R. Knudsen, Vincent Rijmen (May 1997). "Two Attacks on Reduced IDEA" (gzipped PostScript). Advances in Cryptology - EUROCRYPT '97. Konstanz: Springer-Verlag. pp. pp.1–13. Retrieved 2007-03-08. {{cite conference}}: |pages= has extra text (help); Unknown parameter |booktitle= ignored (|book-title= suggested) (help)CS1 maint: multiple names: authors list (link)
  • Lars Knudsen, M.J.B. Robshaw, David Wagner (1999). "Truncated Differentials and Skipjack" (PostScript). Advances in Cryptology - CRYPTO '99. Santa Barbara, California: Springer-Verlag. pp. pp.165–180. Retrieved 2007-02-27. {{cite conference}}: |pages= has extra text (help); Unknown parameter |booktitle= ignored (|book-title= suggested) (help)CS1 maint: multiple names: authors list (link)
  • M. Matsui, T. Tokita (1999). "Cryptanalysis of a Reduced Version of the Block Cipher E2" (PDF). 6th International Workshop on Fast Software Encryption (FSE 1999). Rome: Springer-Verlag. pp. pp.71–80. Retrieved 2007-02-27. {{cite conference}}: |pages= has extra text (help); Unknown parameter |booktitle= ignored (|book-title= suggested) (help)
  • Shiho Moriai, Yiqun Lisa Yin (2000). "Cryptanalysis of Twofish (II)" (PDF). Retrieved 2007-02-27. {{cite journal}}: Cite journal requires |journal= (help)
  • Henry, Mike (2006). "Broke the code using Digilocker". Retrieved 2007-02-27.