Block Ciphers Based on Modular Arithmetic
نویسندگان
چکیده
The block ciphers PES and IPES were originally designed with the ambition to become the successor of DES as a standard. In this paper we point out why this would be a bad idea. On one hand a new block cipher (called MMB) is proposed, that uses similar primitive operations as (I)PES but can be more efficiently implemented both in hardware and in software. On the other hand classes of weak keys (with size up to 251) have been found for IPES.
منابع مشابه
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is approximately equal to the block length. A general model is presented, and it is shown that this model covers 9 schemes that have appeared in the literature. Within this general model 64 possible schemes exist, and it is s...
متن کاملAlgorithms and Software Tools for Teaching Mathematical Fundamentals of Computer Security
Java applet-based tools have been developed for exploring mathematical foundations of computer security techniques including modular arithmetic, primes, permutations, combinations, probability, authentication algorithms, and hashes. Tools were used by students to examine MonoAlphabetic and shift substitution ciphertexts, Playfair and Vigenère ciphers, message digests, digital signatures, and pu...
متن کاملMILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the significant results for some ciphers such as SIMON (a family of lightweight and hardware-optimized block ciphers designed by NSA) etc. However, in the literature, the MILP-based automatic search algor...
متن کاملOn the (In)security of Stream Ciphers Based on Arrays and Modular Addition
Stream ciphers play an important role in symmetric cryptology because of their suitability in high speed applications where block ciphers fall short. A large number of fast stream ciphers or pseudorandom bit generators (PRBGs) can be found in the literature that are based on arrays and simple operations such as modular additions, rotations and memory accesses (e.g. RC4, RC4A, Py, Py6, ISAAC etc...
متن کاملAnalysis and Design of Cryptographic Hash Functions
The subject of this thesis is the study of cryptographic hash functions. The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. Theoretical results on cryptographic hash functions are reviewed. The information theoretic approach to authentication is de...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1993