Главная
Study mode:
on
1
Outline
2
Simple model
3
Indicator
4
Indistinct
5
Bayesian analysis
6
What does it work
7
Expected number of blocks
8
Loglog plot
9
Real world
10
Leaks
11
Limit number of blocks
12
Counter mode
13
Multiple known plaintext
14
Capital epsilon
15
More sophisticated model
16
Target values
17
Repeated values
18
Repeated target values
19
Reasonable attack
20
Practice
21
Hybrid
22
Conclusions
Description:
Explore the intricacies of cryptanalysis and collision attacks in this 27-minute conference talk from FSE 2013. Delve into David McGrew's presentation on impossible plaintext cryptanalysis and probable plaintext collision attacks of 64-bit block ciphers. Examine topics such as simple models, Bayesian analysis, expected number of blocks, and real-world implications. Investigate leaks, counter mode, and multiple known plaintext scenarios. Gain insights into more sophisticated models, target values, and reasonable attack practices. Conclude with a discussion on hybrid approaches and key takeaways in the field of cryptography and information security.

Impossible Plaintext Cryptanalysis and Probable Plaintext Collision Attacks of 64-Bit Block Ci

TheIACR
Add to list