Skip to main content

Differential Cryptanalysis

  • Reference work entry
Encyclopedia of Cryptography and Security

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3–72

    MATH  MathSciNet  Google Scholar 

  2. Biham E, Shamir A (1991) Differential cryptanalysis of FEAL and N-hash. Technical report CS91-17. In: Advances in cryptology. Proceedings of EUROCRYPT’91, Brighton, April 1991. Lecture notes in computer science, vol 547. Springer, Berlin, pp 1–16

    Google Scholar 

  3. Biham E, Shamir A (1992) Differential cryptanalysis of the full 16-round DES. In: Advances in cryptology. Proceedings of CRYPTO’92, Santa Barbara, August 1992. Lecture notes in computer science, vol 740. Springer, Berlin, pp 487–496

    Google Scholar 

  4. Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin

    MATH  Google Scholar 

  5. Biryukov A, Kushilevitz E (1998) From differential cryptanalysis to ciphertext-only attacks. In: Advances in cryptology. Proceedings of CRYPTO’98, Santa Barbara, August 1998. Lecture notes in computer science, vol 1462. Springer, Berlin, pp 72–88

    Google Scholar 

  6. Biham E, Biryukov A, Shamir A (1999) Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. In: Advances in cryptology, Proceedings of EUROCRYPT’99, Prague, May 1999. Lecture notes in computer science, vol 1592. Springer, Berlin, pp 12–23

    Google Scholar 

  7. Biham E, Dunkelman O, Keller N (2002) New results on boomerang and rectangle attacks. In: Proceedings of fast software encryption 2002, Leuven, February 2002. Lecture notes in computer science, vol 2365. Springer, Berlin, pp 1–16

    Google Scholar 

  8. Kelsey J, Kohno T, Schneier B (1999) Amplified boomerang attacks against reduced-round MARS and serpent. In: Proceedings of fast software encryption 7, New York, April 2000. Lecture notes in computer science, vol 1978. Springer, Berlin, pp 75–93

    Google Scholar 

  9. Knudsen L (1995) Truncated and higher order differentials. In: Proceedings of fast software encryption 2, Leuven, December 1994. Lecture notes in computer science, vol 1008. Springer, Berlin, pp 196–211

    Google Scholar 

  10. Knudsen LR (1998) DEAL – A 128-bit block cipher, AES submission. http://www2.mat.dtu.dk/people/Lars.R.Knudsen/papers/deal.pdf

  11. Lai X (1994) Higher order derivative and differential cryptanalysis. In: Proceedings of symposium on communication, coding and cryptography (in honor of J. L. Massey on the occasion of his 60th birthday)

    Google Scholar 

  12. Lai X, Massey JL, Murphy S (1991) Markov ciphers and differential cryptanalysis. In: Advances in cryptology. Proceedings of EUROCRYPT’91, Brighton, April 1991. Lecture notes in computer science, vol 547. Springer, Berlin, pp 17–38

    Google Scholar 

  13. Miyaguchi S, Shiraishi A, Shimizu A (1988) Fast data encryption algorithm FEAL-8. Rev Electr Commun laboratories 36(4): 433–437

    Google Scholar 

  14. National Bureau of Standards (1977) Data encryption standard, U.S. Department of Commerce, FIPS pub. 46

    Google Scholar 

  15. Shimizu A, Miyaguchi S (1987) Fast data encryption algorithm FEAL. In: Advances in cryptology. Proceedings of EUROCRYPT’87, Amsterdam. Lecture notes in computer science, pp 267–278

    Google Scholar 

  16. Vaudenay S (1998) Provable security for block ciphers by decorrelation. In: Proceedings of STACS’98, Paris, February 1998. Lecture notes in computer science, vol 1373. Springer, Berlin, pp 249–275

    Google Scholar 

  17. Wagner D (1999) The boomerang attack. In: Proceedings of fast software encryption, Rome, March 1999. Lecture notes in computer science, vol 1636. Springer, Berlin, pp 156–170

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Biham, E. (2011). Differential Cryptanalysis. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_572

Download citation

Publish with us

Policies and ethics