The term refers to the attack method on a cipher and belongs to the class of so-called known-plaintext attacks. One tries to discover and exploit simple (“linear”) dependencies between the bits of the plaintext and the ciphertext in order to obtain information about the key.
Recent Posts
- Newly published: Atos whitepaper on post-quantum cryptography
- Newly published: cryptovision special issue of “The Vault” magazine
- US standards body NIST announces four winners in post-quantum competition
- Mindshare 2022 video: Two great days in 70 seconds
- New GreenShield version receives BSI approval