From Surf Wiki (app.surf) — the open knowledge base
Integral cryptanalysis
Type of cryptanalytic attack
Type of cryptanalytic attack
In cryptography, integral cryptanalysis is a cryptanalytic attack that is particularly applicable to block ciphers based on substitution–permutation networks. It was originally designed by Lars Knudsen as a dedicated attack against Square, so it is commonly known as the Square attack. It was also extended to a few other ciphers related to Square: CRYPTON, Rijndael, and SHARK. Stefan Lucks generalized the attack to what he called a saturation attack and used it to attack Twofish, which is not at all similar to Square, having a radically different Feistel network structure. Forms of integral cryptanalysis have since been applied to a variety of ciphers, including Hierocrypt, IDEA, Camellia, Skipjack, MISTY1, MISTY2, SAFER++, KHAZAD, and FOX (now called IDEA NXT).
Unlike differential cryptanalysis, which uses pairs of chosen plaintexts with a fixed XOR difference, integral cryptanalysis uses sets or even multisets of chosen plaintexts of which part is held constant, and another part varies through all possibilities. For example, an attack might use 256 chosen plaintexts that have all but 8 of their bits the same, but all differ in those 8 bits. Such a set necessarily has an XOR sum of 0, and the XOR sums of the corresponding sets of ciphertexts provide information about the cipher's operation. This contrast between the differences of pairs of texts and the sums of larger sets of texts inspired the name "integral cryptanalysis", borrowing the terminology of calculus.
References
- {{ cite conference | access-date = 2007-02-15 }}
- {{ cite conference | access-date = 2007-03-03 }}
- {{ cite conference | access-date = 2007-03-06 }}
- {{ cite conference | access-date = 2006-11-30 }}
- {{ cite conference | access-date = 2007-03-03 }}
- {{ cite journal | access-date = 2007-03-03 }}
- {{cite conference | access-date = 2007-03-03
- {{cite conference | access-date = 2007-03-03 | archive-url = https://web.archive.org/web/20070525204822/http://maths.utime.cn:81/Crypt1998-2003/bibs/2365/23650100.htm | archive-date = 2007-05-25 | url-status = dead
- {{ cite conference | access-date = 2006-11-30 }}
- {{ cite journal | access-date = 2007-03-03 }}
- {{cite conference | archive-url = https://archive.today/20070723200754/http://www.mathmagic.cn/Crypt1998-2003/bibs/2894/28940347.htm | url-status = dead | archive-date = 2007-07-23 | access-date = 2007-03-03
- {{ cite journal | access-date = 2007-03-03 }}
This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.
Ask Mako anything about Integral cryptanalysis — get instant answers, deeper analysis, and related topics.
Research with MakoFree with your Surf account
Create a free account to save articles, ask Mako questions, and organize your research.
Sign up freeThis content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.
Report