Skip to content
Surf Wiki
Save to docs
general/cryptographic-attacks

From Surf Wiki (app.surf) — the open knowledge base

Impossible differential cryptanalysis

Exploitation of impossible differences in block ciphers


Exploitation of impossible differences in block ciphers

In cryptography, impossible differential cryptanalysis is a form of differential cryptanalysis for block ciphers. While ordinary differential cryptanalysis tracks differences that propagate through the cipher with greater than expected probability, impossible differential cryptanalysis exploits differences that are impossible (having probability 0) at some intermediate state of the cipher algorithm.

Lars Knudsen appears to be the first to use a form of this attack, in the 1998 paper where he introduced his AES candidate, DEAL.{{ cite journal

Biham, Biryukov and Shamir also presented a relatively efficient specialized method for finding impossible differentials that they called a miss-in-the-middle attack. This consists of finding "two events with probability one, whose conditions cannot be met together."

References

References

  1. Flash]])
  2. Biryukov, A. (August 25, 1998) [http://video.google.com/videoplay?docid=-5370812042739937841&hl=en Miss-in-the-middle attacks on IDEA.] CRYPTO '98 rump session (video at Google Video—uses Flash)
  3. Biham, E. (August 25, 1998) [http://video.google.com/videoplay?docid=-312957337727284112&hl=en Impossible cryptanalysis of Skipjack.] CRYPTO '98 rump session (video at Google Video—uses Flash)
  4. Bruce Schneier. (September 15, 1998). "Impossible Cryptanalysis and Skipjack". Crypto-Gram Newsletter.
  5. (March 1999). "Miss in the Middle Attacks on IDEA, Khufu and Khafre". [[Springer-Verlag]].
Info: Wikipedia Source

This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.

Want to explore this topic further?

Ask Mako anything about Impossible differential cryptanalysis — get instant answers, deeper analysis, and related topics.

Research with Mako

Free with your Surf account

Content sourced from Wikipedia, available under CC BY-SA 4.0.

This content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.

Report