Block Ciphers Based on Modular Arithmetic

نویسندگان

  • Joan Daemen
  • Joos Vandewalle
چکیده

The block ciphers PES and IPES were originally designed with the ambition to become the successor of DES as a standard. In this paper we point out why this would be a bad idea. On one hand a new block cipher (called MMB) is proposed, that uses similar primitive operations as (I)PES but can be more efficiently implemented both in hardware and in software. On the other hand classes of weak keys (with size up to 251) have been found for IPES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hash Functions Based on Block Ciphers: A Synthetic Approach

Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is approximately equal to the block length. A general model is presented, and it is shown that this model covers 9 schemes that have appeared in the literature. Within this general model 64 possible schemes exist, and it is s...

متن کامل

Algorithms and Software Tools for Teaching Mathematical Fundamentals of Computer Security

Java applet-based tools have been developed for exploring mathematical foundations of computer security techniques including modular arithmetic, primes, permutations, combinations, probability, authentication algorithms, and hashes. Tools were used by students to examine MonoAlphabetic and shift substitution ciphertexts, Playfair and Vigenère ciphers, message digests, digital signatures, and pu...

متن کامل

MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck

In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the significant results for some ciphers such as SIMON (a family of lightweight and hardware-optimized block ciphers designed by NSA) etc. However, in the literature, the MILP-based automatic search algor...

متن کامل

On the (In)security of Stream Ciphers Based on Arrays and Modular Addition

Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fast stream ciphers or pseudorandom bit generators (PRBGs) can be found in the literature that are based on arrays and simple operations such as modular additions, rotations and memory accesses (e.g. RC4, RC4A, Py, Py6, ISAAC etc...

متن کامل

Analysis and Design of Cryptographic Hash Functions

The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash functions are reviewed. The information theoretic approach to authentication is de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1993