Mastering Differential Cryptanalysis: A Beginner's Guide with FEAL-4 π
Learn how to identify and exploit weaknesses in block ciphers through differential cryptanalysis, using FEAL-4 as a practical example. Perfect for beginners!

Keith Simonsen
7.4K views β’ May 7, 2014

About this video
This talk is an introduction to finding and exploiting vulnerabilities in block ciphers using FEAL-4 as a case study. Attendees will learn how cryptanalysis can be used to break ciphers by finding the key with less computational effort than exhaustive search. After an introduction to block cipher components and structure, we will study the incredibly broken FEAL-4 algorithm. By exploiting statistical biases in the cipher, attendees will learn how to build a differential attack and ultimately recover the key.
Attendees should have a basic understanding of binary operations like XOR and a general familiarity with bits and bytes. Jon will guide attendees through the fundamentals of modern cryptanalysis while keeping the math to a minimum. That said, this talk is focused on the nitty gritty details of cipher vulnerabilities and how differential cryptanalysis can be applied to them.
Jon is also able to provide overviews of other cryptanalytic attacks (linear, boomerang, impossible differential, slide, etc..) if time permits and there is interest.
About the speaker:
Jon King is an active-duty member of the US Navy that enjoys breaking security as a hobby. He primarily focuses on finding vulnerabilities in high-security locks and tamper-evident devices. Additionally, Jon studies cryptanalysis with a focus on implementing realistic attacks against modern block ciphers. Despite having very little math background, he has digested the writings of the academic cryptography world and is available to translate their esoteric math-talk.
Attendees should have a basic understanding of binary operations like XOR and a general familiarity with bits and bytes. Jon will guide attendees through the fundamentals of modern cryptanalysis while keeping the math to a minimum. That said, this talk is focused on the nitty gritty details of cipher vulnerabilities and how differential cryptanalysis can be applied to them.
Jon is also able to provide overviews of other cryptanalytic attacks (linear, boomerang, impossible differential, slide, etc..) if time permits and there is interest.
About the speaker:
Jon King is an active-duty member of the US Navy that enjoys breaking security as a hobby. He primarily focuses on finding vulnerabilities in high-security locks and tamper-evident devices. Additionally, Jon studies cryptanalysis with a focus on implementing realistic attacks against modern block ciphers. Despite having very little math background, he has digested the writings of the academic cryptography world and is available to translate their esoteric math-talk.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
7.4K
Likes
93
Duration
38:49
Published
May 7, 2014
User Reviews
4.4
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now