Differential cryptanalysis

The discovery of differential cryptanalysis is generally attributed to Eli Biham and Adi Shamir in the late 1980s, who published a number of attacks against various block ciphers and hash functions, including a theoretical weakness in the Data Encryption Standard (DES).It was noted by Biham and Shamir that DES was surprisingly resistant to differential cryptanalysis, but small modifications to the algorithm would make it much more susceptible.[2] According to author Steven Levy, IBM had discovered differential cryptanalysis on its own, and the NSA was apparently well aware of the technique.This in turn would weaken the competitive advantage the United States enjoyed over other countries in the field of cryptography.[4] While DES was designed with resistance to differential cryptanalysis in mind, other contemporary ciphers proved to be vulnerable.An analysis of the algorithm's internals is undertaken; the standard method is to trace a path of highly probable differences through the various stages of encryption, termed a differential characteristic.Observing the desired output difference (between two chosen or known plaintext inputs) suggests possible key values.In essence, to protect a cipher from the attack, for an n-bit non-linear function one would ideally seek as close to 2−(n − 1) as possible to achieve differential uniformity.In fact, the AES cipher would be just as immune to differential and linear attacks with a much weaker non-linear function.For example, with the current S-box AES emits no fixed differential with a probability higher than (4/256)50 or 2−300 which is far lower than the required threshold of 2−128 for a 128-bit block cipher.
Differentialcryptanalysisblock ciphernon-random behaviorEli BihamAdi ShamirData Encryption StandardDon CoppersmithSteven Levychosen plaintextschosen plaintext attackciphertextsplaintextsknown plaintextciphertext-only attackDifferenceeXclusive OR (XOR)S-boxescipherrandoman exhaustive searchAdvanced Encryption Standardprovenleast significant bitAES cipherSAT solveraffine mappingHigher-order differential cryptanalysisTruncated differential cryptanalysisImpossible differential cryptanalysisBoomerang attackCryptographyIntegral cryptanalysisLinear cryptanalysisDifferential equations of additionLevy SPenguin Bookssci.cryptWayback MachineBlock cipherssecurity summaryBlowfishinternal mechanicsTriple DESSerpentTwofishCamelliaCAST-128SkipjackAdiantumAkelarreAnubisBaseKingBassOmaticBEAR and LIONCAST-256ChiasmusCIKS-1CIPHERUNICORN-ACIPHERUNICORN-ECLEFIACOCONUT98Cryptomeria/C2CRYPTONCS-CipherGrand CruHasty Pudding cipherHierocryptIDEA NXTIntel Cascade CipherKalynaKASUMIKeeLoqKHAZADKhufu and KhafreKN-CipherKuznyechikLadder-DESLuciferMacGuffinMadrygaMAGENTAMISTY1MULTI2MultiSwapNew Data SealNewDESNimbusNOEKEONPRESENTPrinceRed PikeSAVILLESC2000SHACALSpectr-H64SquareSXAL/MBALThreefishTreyferZodiacFeistel networkKey scheduleLai–Massey schemeProduct cipherConfusion and diffusionAvalanche effectBlock sizeKey sizeKey whiteningWhitening transformationBrute-forceEFF DES crackerBiclique attack3-subset MITM attackLinearPiling-up lemmaImpossibleTruncatedHigher-orderDifferential-linearDistinguishingKnown-keyIntegral/SquareBoomerangRelated-keyRotationalSide-channelTimingPower-monitoringElectromagneticAcousticDifferential-faultInterpolationPartitioningRubber-hoseBlack-bagDaviesReboundWeak keyChi-squareTime/memory/data tradeoffAES processCRYPTRECNESSIENSA Suite BInitialization vectorMode of operationPaddingHistory of cryptographyOutline of cryptographyClassical cipherCryptographic protocolAuthentication protocolCryptographic primitiveCryptocurrencyCryptosystemCryptographic nonceCryptovirologyHash functionCryptographic hash functionKey derivation functionSecure Hash AlgorithmsDigital signatureKleptographyKey (cryptography)Key exchangeKey generatorKey stretchingKeygenCryptojacking malwareRansomwareRandom number generationCryptographically secure pseudorandom number generatorPseudorandom noiseSecure channelInsecure channelSubliminal channelEncryptionDecryptionEnd-to-end encryptionHarvest now, decrypt laterInformation-theoretic securityPlaintextCodetextCiphertextShared secretTrapdoor functionTrusted timestampingKey-based routingOnion routingGarlic routingKademliaMix networkStream cipherSymmetric-key algorithmAuthenticated encryptionPublic-key cryptographyQuantum key distributionQuantum cryptographyPost-quantum cryptographyMessage authentication codeRandom numbersSteganography