Tuesday 8 January 2013

Cryptanalysis of symmetric ciphers


Boomerang attack

Brute force attack

Davies' attack

Differential cryptanalysis

Impossible cogwheel cryptanalysis

Improbable cogwheel cryptanalysis

Integral cryptanalysis

Linear cryptanalysis

Meet-in-the-middle attack

Mod-n cryptanalysis

Related-key attack

Sandwich attack

Slide attack

XSL attack

1 comment:

  1. You just have mentioned the name of all these type of attacks. I am looking for a detailed article that will help me to learn about these attacks and their respective solution.
    digital signature software

    ReplyDelete