Related Concepts
Definition
Generally speaking, a distinguishing attack is a testing algorithm that tries to exhibit a nonrandom behavior in a cryptosystem. This nonrandom behavior can provide some information to the attacker.
Theory
A distinguisher is a testing algorithm that is connected to either a perfect random procedure \(\mathcal{R}\) or to the cryptosystem (or a part of it) \(\mathcal{C}\) which is supposed to mimic \(\mathcal{R}\). If the distinguisher is able to tell them apart with a significant advantage, then it leads to a distinguishing attack. This is a very general setting that can apply to any cryptosystem but is more or less relevant to assess its security.
Applications
Ciphertext indistinguishability: At the basis of all ciphers are some deterministic functions (otherwise it would be difficult to decipher) which takes as a parameter a key and as an input a message. A plain application of the deterministic functions on the key and...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
Goldwasser S, Micali S (1984) Probabilistic encryption. J Comput Syst Sci 28:270–299
Rose G, Hawkes P (2002) On the applicability of distinguishing attacks against stream ciphers. In: Proceedings of the 3rd NESSIE Workshop 2002, Munich. Cryptology ePrint Archive, Report 2002/142
Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, London
Matsui M (1993) Linear cryptanalysis method for DES cipher. In: Advances in cryptology – Eurocrypt’93 (Lecture notes in computer science 765) Springer, Berlin, pp 386–397
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Videau, M. (2011). Distinguishing Attacks. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_345
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_345
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering