词条 | Cipher security summary | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
释义 |
This article summarizes publicly known attacks against block ciphers and stream ciphers. Note that there are perhaps attacks that are not publicly known, and not all entries may be up to date. Table color key{{legend|#f9f9f9|No known successful attacks — attack only breaks a reduced version of the cipher}}{{legend|#ffff90|Theoretical break — attack breaks all rounds and has lower complexity than security claim}}{{legend|#ff9090|Attack demonstrated in practice}}Best attackThis column lists the complexity of the attack:
Common ciphersKey or plaintext recovery attacksAttacks that lead to disclosure of the key or plaintext.
Distinguishing attacks{{Main|Distinguishing attack}}Attacks that allow distinguishing ciphertext from random data.
Less common ciphersKey recovery attacksAttacks that lead to disclosure of the key.
Distinguishing attacks{{Main|Distinguishing attack}}Attacks that allow distinguishing ciphertext from random data.
See also
References1. ^{{cite journal|url=https://eprint.iacr.org/2011/449|title=Biclique Cryptanalysis of the Full AES|date=2011-08-17|author1=Andrey Bogdanov|author2=Dmitry Khovratovich|author3=Christian Rechberger}} {{cryptography navbox | block}}2. ^{{cite journal |author=Vincent Rijmen |year=1997 |title=Cryptanalysis and Design of Iterated Block Ciphers |journal=Ph.D. Thesis |url=https://www.cosic.esat.kuleuven.be/publications/thesis-4.ps }} 3. ^{{cite web|url=https://www.computerworld.com.au/article/46254/bruce_almighty_schneier_preaches_security_linux_faithful/|title=Bruce Almighty: Schneier preaches security to Linux faithful|date=2007-12-27|author=Dahna McConnachie|work=Computerworld|deadurl=no|archiveurl=https://web.archive.org/web/20120603124940/http://www.computerworld.com.au/article/46254/bruce_almighty_schneier_preaches_security_linux_faithful/|archivedate=2012-06-03|df=}} 4. ^1 {{cite web| url=https://sweet32.info/| title=On the Practical (In-)Security of 64-bit Block Ciphers — Collision Attacks on HTTP over TLS and OpenVPN| author=Karthikeyan Bhargavan, Gaëtan Leurent| date=August 2016| publisher=ACM CCS 2016}} 5. ^{{cite journal |author=Niels Ferguson |date=1999-10-05 |title=Impossible Differentials in Twofish |url=https://www.schneier.com/paper-twofish-impossible.html }} 6. ^{{cite conference |author1=Eli Biham |author2=Orr Dunkelman |author3=Nathan Keller |date=2002-02-04 |title=Linear Cryptanalysis of Reduced Round Serpent |conference=FSE 2002 |doi=10.1007/3-540-45473-X_2 }} 7. ^{{cite conference |last=Junod |first=Pascal |url=http://crypto.junod.info/sac01.html |title=On the Complexity of Matsui's Attack |conference=Selected Areas in Cryptography |date=2001 |pages=199–211 |archive-url=https://web.archive.org/web/20090527065754/http://crypto.junod.info/sac01.html |archivedate=2009-05-27 }} 8. ^{{cite web |url=https://w2.eff.org/Privacy/Crypto/Crypto_misc/DESCracker/HTML/19980716_eff_des_faq.html |quote=On Wednesday, July 17, 1998 the EFF DES Cracker, which was built for less than $250,000, easily won RSA Laboratory's "DES Challenge II" contest and a $10,000 cash prize. |title=DES Cracker Project |work=EFF}} 9. ^{{cite web |title=COPACOBANA – Special-Purpose Hardware for Code-Breaking |url=http://www.sciengines.com/copacobana }} 10. ^{{cite book |author=Stefan Lucks |title=Fast Software Encryption |date=1998-03-23 |booktitle=Lecture Notes in Computer Science |volume=1372 |pages=239–253 |publisher=Fast Software Encryption |doi=10.1007/3-540-69710-1_16 |series=Lecture Notes in Computer Science |isbn=978-3-540-64265-7 |chapter=Attacking Triple Encryption }} 11. ^{{cite journal |author1=Orr Dunkelman |author2=Nathan Keller |author3=Adi Shamir |date=2010-01-10 |title=A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony |url=https://eprint.iacr.org/2010/013 }} 12. ^{{cite conference |authors=Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin |date=2007 |title=Breaking 104 Bit WEP in Less Than 60 Seconds |conference=WISA 2007 |url=https://eprint.iacr.org/2007/120 }} 13. ^{{cite conference |author1=Scott Fluhrer |author2=Itsik Mantin |author3=Adi Shamir |date=2001-12-20 |title=Weaknesses in the Key Scheduling Algorithm of RC4 |conference=Selected Areas in Cryptography 2001 |url=http://www.crypto.com/papers/others/rc4_ksaproc.pdf }} 14. ^{{cite conference |authors=Scott R. Fluhrer, David A. McGrew |title=Statistical Analysis of the Alleged RC4 Keystream Generator |conference=FSE 2000 |pages=19 – 30 |format=PDF |url=http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/FluhrerMcgrew.pdf |deadurl=yes |archiveurl=https://web.archive.org/web/20140502020708/http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/FluhrerMcgrew.pdf |archivedate=2014-05-02 |df= }} 15. ^1 2 {{cite book |author1=John Kelsey |author2=Bruce Schneier |author3=David Wagner |date=1997-11-11 |title=Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X NewDES, RC2, and TEA |url=http://www.schneier.com/paper-relatedkey.html |journal=Lecture Notes in Computer Science |volume=1334 | pages=233–246 |doi=10.1007/BFb0028479|isbn=978-3-540-63696-0 |citeseerx=10.1.1.35.8112 }} 16. ^{{cite book |author1=Meiqin Wang |author2=Xiaoyun Wang |author3=Changhui Hu |date=2009-08-23 |title= New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256 |volume=5381 |pages=429–441 |doi=10.1007/978-3-642-04159-4_28 |series=Lecture Notes in Computer Science |isbn=978-3-642-04158-7 }} 17. ^{{cite web |url=https://www.di.ens.fr/~leurent/files/IDEA_EC12.pdf |title=Narrow-Bicliques: Cryptanalysis of Full IDEA |author1=Dmitry Khovratovich |author2=Gaetan Leurent |author3=Christian Rechberger }} 18. ^{{cite journal |author=Achiya Bar-On |date=2015-07-30 |title=A 270 Attack on the Full MISTY1 |url=https://eprint.iacr.org/2015/746 }} 19. ^{{cite conference |author=Yosuke Todo |date=2015-07-06 |title=Integral Cryptanalysis on Full MISTY1 |conference=CRYPTO 2015 |url=https://eprint.iacr.org/2015/682 }} 20. ^{{Cite journal|date=30 September 2012|title=ECRYPT II Yearly Report on Algorithms and Keysizes (2011-2012)|url=https://cordis.europa.eu/docs/projects/cnect/6/216676/080/deliverables/002-DSPA20.pdf|journal=|id=D.SPA.20 Rev. 1.0, ICT-2007-216676 ECRYPT II|via=CORDIS}} 21. ^Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths, NIST 22. ^{{cite journal |author=Elias Yarrkov |date=2010-05-04 |title=Cryptanalysis of XXTEA |url=https://eprint.iacr.org/2010/254 }} 23. ^{{cite book |authors=Andrey Bogdanov, Gregor Leander, Kaisa Nyberg, Meiqin Wang |title=Integral and multidimensional linear distinguishers with correlation zero |journal=Lecture Notes in Computer Science |volume=7658 |pages=244–261 |date=2012-12-04 |url=https://www.iacr.org/archive/asiacrypt2012/76580239/76580239.pdf |doi=10.1007/978-3-642-34961-4 |isbn=978-3-642-34960-7 }} 2 : Block ciphers|Cryptography lists and comparisons |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。