翻訳と辞書
Words near each other
・ Mod DB
・ Mod deflate
・ MoD Donnington
・ Mod Fuck Explosion
・ Mod Fun
・ Mod gzip
・ Mod jk
・ Mod Ka Nimbahera
・ Mod Kashin-class destroyer
・ MoD Kineton
・ Mod league
・ Mod lisp
・ MoD Lyneham
・ Mod Mobilian
・ Mod mono
Mod n cryptanalysis
・ Mod oai
・ MOD Ontology
・ Mod openpgp
・ Mod parrot
・ Mod perl
・ MOD Pizza
・ MoD Procurement Executive
・ Mod proxy
・ Mod python
・ Mod qos
・ Mod revival
・ Mod ruby
・ MoD Sealand
・ Mod ssl


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Mod n cryptanalysis : ウィキペディア英語版
Mod n cryptanalysis
In cryptography, mod ''n'' cryptanalysis is an attack applicable to block and stream ciphers. It is a form of partitioning cryptanalysis that exploits unevenness in how the cipher operates over equivalence classes (congruence classes) modulo ''n''. The method was first suggested in 1999 by John Kelsey, Bruce Schneier, and David Wagner and applied to RC5P (a variant of RC5) and M6 (a family of block ciphers used in the FireWire standard). These attacks used the properties of binary addition and bit rotation modulo a Fermat prime.
==Mod 3 analysis of RC5P==
For RC5P, analysis was conducted modulo 3. It was observed that the operations in the cipher (rotation and addition, both on 32-bit words) were somewhat biased over congruence classes mod 3. To illustrate the approach, consider left rotation by a single bit:
: X \lll 1=\left\ X < 2^ \\ 2X + 1 - 2^, & \mbox X \geq 2^\end\right.
Then, because
: 2^ \equiv 1\pmod 3,\,
we can deduce that
: X \lll 1 \equiv 2X\pmod 3.
Thus left rotation by a single bit has a simple description modulo 3. Analysis of other operations (data dependent rotation and modular addition) reveals similar, notable biases. Although there are some theoretical problems analysing the operations in combination, the bias can be detected experimentally for the entire cipher. In (Kelsey et al., 1999), experiments were conducted up to seven rounds, and based on this they conjecture that as many as nineteen or twenty rounds of RC5P can be distinguished from random using this attack. There is also a corresponding method for recovering the secret key.
Against M6 there are attacks mod 5 and mod 257 that are even more effective.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Mod n cryptanalysis」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.