This article will be permanently flagged as inappropriate and made unaccessible to everyone. Are you certain this article is inappropriate? Excessive Violence Sexual Content Political / Social
Email Address:
Article Id: WHEBN0000609603 Reproduction Date:
In cryptography, the so-called product ciphers are a certain kind of ciphers, where the (de-)ciphering of data is done in "rounds". The general setup of each round is the same, except for some hard-coded parameters and a part of the cipher key, called a subkey. A key schedule is an algorithm that, given the key, calculates the subkeys for these rounds.
Knudsen and Mathiassen (2004) give some experimental evidence that indicate that the key schedule plays a part in providing strength against linear and differential cryptanalysis. For toy Feistel ciphers, it was observed that those with complex and well-designed key schedules can reach a uniform distribution for the probabilities of differentials and linear hulls faster than those with poorly designed key schedules.
World War II, Steganography, Espionage, Internet, Germany
Don Coppersmith, Wayback Machine, Whitfield Diffie, Martin Hellman, John Gilmore (activist)
World War II, E, World War I, Enigma machine, Bletchley Park
Cryptography, Data Encryption Standard, S-box, Cryptanalysis, Block cipher
Cryptography, Cipher, Randomness, Cryptanalysis, Block cipher
Cryptography, Sicily, Data Encryption Standard, S-box, Snow
Cryptography, Key size, Block size (cryptography), Cryptographic hash function, Cryptanalysis
Advanced Encryption Standard, Pi, Twofish, Cryptanalysis, Block cipher
Cryptography, Transport Layer Security, Stream cipher, Wired Equivalent Privacy, Internet
Cryptography, Singapore, S-box, Block cipher, Nessie