About: Davies attack     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : owl:Thing, within Data Space : dbpedia.demo.openlinksw.com associated with source document(s)
QRcode icon
http://dbpedia.demo.openlinksw.com/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FDavies_attack

In cryptography, the Davies attack is a dedicated statistical cryptanalysis method for attacking the Data Encryption Standard (DES). The attack was originally created in 1987 by Donald Davies. In 1994, Eli Biham and Alex Biryukov made significant improvements to the technique. It is a known-plaintext attack based on the non-uniform distribution of the outputs of pairs of adjacent S-boxes. It works by collecting many known plaintext/ciphertext pairs and calculating the empirical distribution of certain characteristics. Bits of the key can be deduced given sufficiently many known plaintexts, leaving the remaining bits to be found through brute force. There are tradeoffs between the number of required plaintexts, the number of key bits found, and the probability of success; the attack can fin

AttributesValues
rdfs:label
  • Davies attack (en)
  • Attacco di Davies (it)
rdfs:comment
  • In cryptography, the Davies attack is a dedicated statistical cryptanalysis method for attacking the Data Encryption Standard (DES). The attack was originally created in 1987 by Donald Davies. In 1994, Eli Biham and Alex Biryukov made significant improvements to the technique. It is a known-plaintext attack based on the non-uniform distribution of the outputs of pairs of adjacent S-boxes. It works by collecting many known plaintext/ciphertext pairs and calculating the empirical distribution of certain characteristics. Bits of the key can be deduced given sufficiently many known plaintexts, leaving the remaining bits to be found through brute force. There are tradeoffs between the number of required plaintexts, the number of key bits found, and the probability of success; the attack can fin (en)
  • In crittanalisi, l'attacco di Davies è un metodo statistico per attaccare l'algoritmo di cifratura Data Encryption Standard (DES). Originariamente creato da nel 1987 e migliorato significativamente nel 1994 da Eli Biham e , questo metodo è un attacco di tipo known-plaintext che sfrutta la distribuzione non uniforme dell'output delle coppie di S-box adiacenti. C'è un bilanciamento tra il numero di testi in chiaro richiesti, il numero di bit della chiave trovati e la probabilità di successo: l'attacco può trovare 24 bit della chiave con 252 testi in chiaro conosciuti e con il 53% di successo. (it)
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Link from a Wikipage to an external page
sameAs
dbp:wikiPageUsesTemplate
has abstract
  • In cryptography, the Davies attack is a dedicated statistical cryptanalysis method for attacking the Data Encryption Standard (DES). The attack was originally created in 1987 by Donald Davies. In 1994, Eli Biham and Alex Biryukov made significant improvements to the technique. It is a known-plaintext attack based on the non-uniform distribution of the outputs of pairs of adjacent S-boxes. It works by collecting many known plaintext/ciphertext pairs and calculating the empirical distribution of certain characteristics. Bits of the key can be deduced given sufficiently many known plaintexts, leaving the remaining bits to be found through brute force. There are tradeoffs between the number of required plaintexts, the number of key bits found, and the probability of success; the attack can find 24 bits of the key with 252 known plaintexts and 53% success rate. The Davies attack can be adapted to other Feistel ciphers besides DES. In 1998, Pornin developed techniques for analyzing and maximizing a cipher's resistance to this kind of cryptanalysis. (en)
  • In crittanalisi, l'attacco di Davies è un metodo statistico per attaccare l'algoritmo di cifratura Data Encryption Standard (DES). Originariamente creato da nel 1987 e migliorato significativamente nel 1994 da Eli Biham e , questo metodo è un attacco di tipo known-plaintext che sfrutta la distribuzione non uniforme dell'output delle coppie di S-box adiacenti. Questa tecnica consiste nel collezionare molte coppie testo-in-chiaro/testo-cifrato e nel calcolare la distribuzione empirica di certe caratteristiche. Alcuni bit della chiave possono essere dedotti da un numero sufficiente delle suddette coppie, lasciando che i restanti bit vengano trovati tramite ricerca esaustiva. C'è un bilanciamento tra il numero di testi in chiaro richiesti, il numero di bit della chiave trovati e la probabilità di successo: l'attacco può trovare 24 bit della chiave con 252 testi in chiaro conosciuti e con il 53% di successo. (it)
prov:wasDerivedFrom
page length (characters) of wiki page
foaf:isPrimaryTopicOf
is Link from a Wikipage to another Wikipage of
is Wikipage redirect of
is foaf:primaryTopic of
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 67 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software