Applied Cryptography, Second Edition by Bruce Schneier

Applied Cryptography, Second Edition by Bruce Schneier

Author:Bruce Schneier [Schneier, Bruce]
Language: eng
Format: epub
Tags: cryptography, programming
Published: 2014-09-21T16:00:00+00:00


Other Attacks

There are other general attacks against keystream generators. The linear consistency test attempts to identify some subset of the encryption key using matrix techniques [1638]. There is also the meet-in-the-middle consistency attack [39,41]. The linear syndrome algorithm relies on being able to write a fragment of the output sequence as a linear equation [1636,1637]. There is the best affine approximation attack [502] and the derived sequence attack [42]. The techniques of differential cryptanalysis have even been applied to stream ciphers [501], as has linear cryptanalysis [631].



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.