Matches in DBpedia 2014 for { <http://dbpedia.org/resource/XSL_attack> ?p ?o. }
Showing items 1 to 44 of
44
with 100 items per page.
- XSL_attack abstract "In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to break the Advanced Encryption Standard (AES) cipher, also known as Rijndael, faster than an exhaustive search. Since AES is already widely used in commerce and government for the transmission of secret information, finding a technique that can shorten the amount of time it takes to retrieve the secret message without having the key could have wide implications. The method has a high work-factor, which unless lessened, means the technique does not reduce the effort to break AES in comparison to an exhaustive search. Therefore, it does not affect the real-world security of block ciphers in the near future. Nonetheless, the attack has caused some experts to express greater unease at the algebraic simplicity of the current AES.In overview, the XSL attack relies on first analyzing the internals of a cipher and deriving a system of quadratic simultaneous equations. These systems of equations are typically very large, for example 8,000 equations with 1,600 variables for the 128-bit AES. Several methods for solving such systems are known. In the XSL attack, a specialized algorithm, termed eXtended Sparse Linearization, is then applied to solve these equations and recover the key.The attack is notable for requiring only a handful of known plaintexts to perform; previous methods of cryptanalysis, such as linear and differential cryptanalysis, often require unrealistically large numbers of known or chosen plaintexts.".
- XSL_attack wikiPageExternalLink 670135.html.
- XSL_attack wikiPageExternalLink biryukov03block.html.
- XSL_attack wikiPageExternalLink kipnis99cryptanalysis.html.
- XSL_attack wikiPageExternalLink summary?doi=10.1.1.20.4866.
- XSL_attack wikiPageExternalLink 044.
- XSL_attack wikiPageExternalLink 044.
- XSL_attack wikiPageExternalLink aes.
- XSL_attack wikiPageExternalLink 33290320.ps.
- XSL_attack wikiPageExternalLink 18070398-new.pdf.
- XSL_attack wikiPageExternalLink XSL_AC05.pdf.
- XSL_attack wikiPageExternalLink co4514.htm.
- XSL_attack wikiPageExternalLink 1.
- XSL_attack wikiPageExternalLink 2.
- XSL_attack wikiPageExternalLink 8.
- XSL_attack wikiPageExternalLink 7.
- XSL_attack wikiPageExternalLink viewtopic.php?p=47765.
- XSL_attack wikiPageExternalLink wv2r6gl9rmg60fy8.
- XSL_attack wikiPageExternalLink xsl_bes.pdf.
- XSL_attack wikiPageExternalLink aes.html.
- XSL_attack wikiPageID "660941".
- XSL_attack wikiPageRevisionID "603336648".
- XSL_attack hasPhotoCollection XSL_attack.
- XSL_attack subject Category:Cryptographic_attacks.
- XSL_attack type Abstraction100002137.
- XSL_attack type Act100030358.
- XSL_attack type Activity100407535.
- XSL_attack type Attack100972621.
- XSL_attack type CryptographicAttacks.
- XSL_attack type Event100029378.
- XSL_attack type Operation100955060.
- XSL_attack type PsychologicalFeature100023100.
- XSL_attack type YagoPermanentlyLocatedEntity.
- XSL_attack comment "In cryptography, the eXtended Sparse Linearization (XSL) attack is a method of cryptanalysis for block ciphers. The attack was first published in 2002 by researchers Nicolas Courtois and Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to break the Advanced Encryption Standard (AES) cipher, also known as Rijndael, faster than an exhaustive search.".
- XSL_attack label "Attaque XSL".
- XSL_attack label "XSL attack".
- XSL_attack label "XSL-атака".
- XSL_attack sameAs Attaque_XSL.
- XSL_attack sameAs m.030mmc.
- XSL_attack sameAs Q2443442.
- XSL_attack sameAs Q2443442.
- XSL_attack sameAs XSL_attack.
- XSL_attack wasDerivedFrom XSL_attack?oldid=603336648.
- XSL_attack isPrimaryTopicOf XSL_attack.