New Block Encryption Algorithm MISTY

نویسنده

  • Mitsuru Matsui
چکیده

We propose secret-key cryptosystems MISTY1 andMISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY1 and MISTY2. They are designed on the basis of the theory of provable security against di erential and linear cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well as on software environments. Our software implementation shows that MISTY1 with eight rounds can encrypt a data stream in CBCmode at a speed of 20Mbps and 40Mbps on Pentium/100MHz and PA-7200/120MHz, respectively. For its hardware performance, we have produced a prototype LSI by a process of 0.5 CMOS gate-array and con rmed a speed of 450Mbps. In this paper, we describe the detailed speci cations and design principles of MISTY1 and MISTY2. 1 Fundamental Design Policies of MISTY Our purpose of designing MISTY is to o er secret-key cryptosystems that are applicable to various practical systems as widely as possible; for example, software stored in IC cards and hardware used in fast ATM networks. To realize this, we began its design with the following three fundamental policies: 1. MISTY should have a numerical basis for its security, 2. MISTY should be reasonably fast in software on any processor, 3. MISTY should be su ciently fast in hardware implementation. For the rst policy, we have adopted the theory of provable security against di erential and linear cryptanalysis [1][2][4], which was originally introduced by Kaisa Nyberg and Lars Knudsen. As far as we know, MISTY is the rst block encryption algorithm designed for practical use with provable security against di erential and linear cryptanalysis. Although this advantage does not mean information theoretic provable security, we believe that it is a good starting point for discussing secure block ciphers. Secondly, we have noticed the fact that many recent block ciphers were designed so that they could be fastest and/or smallest on speci c targets; for example, 32-bit microprocessors. This often results in slow and/or big implementation on other types of processors. Since we regarded seeking applicability to various systems as more important than pursuing maximum performance on

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Pseudo Randomness from Block Ciphers

MISTY is a data encryption algorithm recently proposed by M. Matsui from Mitsubishi. An important property of MISTY is that, in terms of theoretically provable resistance against linear cryptanalysis which along with differential cryptanalysis is the most powerful cryptanalytic attack known to date, it is twice as secure as the Data Encryption Standard or DES. This property can be attributed to...

متن کامل

On non-pseudorandomness from block ciphers with provable immunity

0 On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis Abstract: Weakness of a block cipher, which has provable immunity against linear cryptanalysis, is investigated. To this end, the round transformation used in MISTY, which is a data encryption algorithm recently proposed by M. Matsui from Mitsubishi Electric Corporation, is compared to the round tra...

متن کامل

Document of MISTY 1 Version 1 . 10 Supporting Document of MISTY 1

We propose secret-key cryptosystems MISTY1 andMISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY1 and MISTY2. They are designed on the basis of the theory of provable security against di erential and linear cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well as on software...

متن کامل

Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract)

MISTY is a data encryption algorithm recently proposed by M Matsui from Mitsubishi Electric Corporation This paper focuses on cryptographic roles of the transform used in the MISTY cipher Our research reveals that when used for constructing pseudorandom permu tations the transform employed by the MISTY cipher is inferior to the transform in DES though the former is superior to the latter in ter...

متن کامل

Decorrelated Fast Cipher : an AES

This report presents a response to the call for candidates issued by the National Institute for Standards and Technologies (the Advanced Encryption Standard project). The proposed candidate | called DFC as for \Decorrelated Fast Cipher" | is based on Vaudenay's decor-relation technique. This provides provable security against several classes of attacks which include the basic version of Biham a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997