Truncated differential cryptanalysis
Form of cryptanalaysis
In cryptography, truncated differential cryptanalysis is a generalization of differential cryptanalysis, an attack model against block ciphers. In 1994 Lars Knudsen designed the technique, during this period ordinary differential cryptanalysis analyzes the full difference between two texts, the truncated version considers differences that are only determined to some extent. It has been applied to SAFER, IDEA, Skipjack, E2, Twofish, Camellia, CRYPTON, and the stream cipher Salsa20 as well.
References
change- Lars Knudsen (1994). "Truncated and Higher Order Differentials" (PDF/PostScript). 2nd International Workshop on Fast Software Encryption (FSE 1994). Leuven: Springer-Verlag. pp. 196–211. Retrieved 2007-02-14.
- Lars Knudsen, Thomas Berson (1996). "Truncated Differentials of SAFER" (PDF/PostScript). 3rd International Workshop on Fast Software Encryption (FSE 1996). Cambridge: Springer-Verlag. pp. 15–26. Retrieved 2007-02-27.
- Johan Borst, Lars R. Knudsen, Vincent Rijmen (May 1997). "Two Attacks on Reduced IDEA". Advances in Cryptology - EUROCRYPT '97. Konstanz: Springer-Verlag. pp. 1–13. Archived from the original (gzipped PostScript) on 2000-08-15. Retrieved 2007-03-08.
{{cite conference}}
: CS1 maint: multiple names: authors list (link) - Lars Knudsen, M.J.B. Robshaw, David Wagner (1999). "Truncated Differentials and Skipjack". Advances in Cryptology - CRYPTO '99. Santa Barbara, California: Springer-Verlag. pp. 165–180. Archived from the original (PostScript) on 2007-09-28. Retrieved 2007-02-27.
{{cite conference}}
: CS1 maint: multiple names: authors list (link) - M. Matsui, T. Tokita (1999). "Cryptanalysis of a Reduced Version of the Block Cipher E2". 6th International Workshop on Fast Software Encryption (FSE 1999). Rome: Springer-Verlag. pp. 71–80. Archived from the original (PDF) on 2007-05-25. Retrieved 2007-02-27.
- Shiho Moriai, Yiqun Lisa Yin (2000). "Cryptanalysis of Twofish (II)" (PDF). Retrieved 2007-02-27.
{{cite journal}}
: Cite journal requires|journal=
(help) - Paul Crowley (2006). "Truncated differential cryptanalysis of five rounds of Salsa20". Retrieved 2007-02-27.