Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
History of cryptography
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Modern cryptanalysis=== While modern ciphers like [[Advanced Encryption Standard|AES]] and the higher quality asymmetric ciphers are widely considered unbreakable, poor designs and implementations are still sometimes adopted and there have been important cryptanalytic breaks of deployed crypto systems in recent years. Notable examples of broken crypto designs include the first [[Wi-Fi]] encryption scheme [[Wired Equivalent Privacy|WEP]], the [[Content Scrambling System]] used for encrypting and controlling DVD use, the [[A5/1]] and [[A5/2]] ciphers used in [[GSM]] cell phones, and the [[CRYPTO1]] cipher used in the widely deployed [[MIFARE]] Classic [[smart card]]s from [[NXP Semiconductors]], a spun off division of [[Philips Electronics]]. All of these are symmetric ciphers. Thus far, not one of the mathematical ideas underlying public key cryptography has been proven to be 'unbreakable', and so some future mathematical analysis advance might render systems relying on them insecure. While few informed observers foresee such a breakthrough, the key size recommended for security as best practice keeps increasing as increased computing power required for breaking codes becomes cheaper and more available. [[Quantum computer]]s, if ever constructed with enough capacity, could break existing public key algorithms and efforts are underway to develop and standardize [[post-quantum cryptography]]. Even without breaking encryption in the traditional sense, [[side-channel attack]]s can be mounted that exploit information gained from the way a computer system is implemented, such as cache memory usage, timing information, power consumption, electromagnetic leaks or even sounds emitted. Newer cryptographic algorithms are being developed that make such attacks more difficult.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)