Advertisement

New Block Cipher: ARIA

  • Daesung Kwon
  • Jaesung Kim
  • Sangwoo Park
  • Soo Hak Sung
  • Yaekwon Sohn
  • Jung Hwan Song
  • Yongjin Yeom
  • E-Joong Yoon
  • Sangjin Lee
  • Jaewon Lee
  • Seongtaek Chee
  • Daewan Han
  • Jin Hong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2971)

Abstract

In this paper, we propose a 128-bit block cipher ARIA which is an involution substitution and permutation encryption network(SPN). We use the same S-boxes as Rijndael to eliminate defects which are caused by a totally involution structure. In the diffusion layer of ARIA, a 16× 16 binary matrix of the maximum branch number 8 is used to avoid some attacks well applied to the reduced round of Rijndael. ARIA uses only basic operations, S-box substitutions and XOR’s together with an involution structure so that it can be efficiently implemented on various platforms.

Keywords

Smart Card Block Cipher Binary Matrix Linear Cryptanalysis Fast Software Encryption 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2001)Google Scholar
  2. 2.
    NIST, NIST announces that Rijndael has been selected as the proposed AES, October 2 (2000), Available at http://csrc.nist.gov/CryptoToolkit/aes/
  3. 3.
    Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-bit block cipher suitable for multiple platforms - design and analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39–56. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  4. 4.
    Matsui, M.: Block Encryption Algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 54–68. Springer, Heidelberg (1997)CrossRefGoogle Scholar
  5. 5.
    Handschuh, H., Naccache, D.: SHACAL. In: Proceedings of the First Open NESSIE Workshop (November 2000)Google Scholar
  6. 6.
    Barreto, P.S.L.M., Rijmen, V.: The Khazad legacy-level block cipher. Primitive submitted to NESSIE (September 2000)Google Scholar
  7. 7.
    Barreto, P.S.L.M., Rijmen, V.: The Anubis block cipher. Primitive submitted to NESSIE (September 2000)Google Scholar
  8. 8.
    NESSIE Project, New European Schemes for Signatures, Integrity and Encryption, Homepage-avaiable at http://cryptonessie.org
  9. 9.
    Biryukov, A.: Analysis of Involutional Ciphers: Khazad and Anubis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 45–53. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  10. 10.
    Gilbert, H., Minier, M.: A collision attack on seven rounds of Rijndael. In: Proceeding of the third AES conference, pp. 230–241. NIST (2000)Google Scholar
  11. 11.
    Ferguson, N., Kesley, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, F.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213–230. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  12. 12.
    Koo, B., Jang, H., Song, J.: Constructing and Cryptanalysis of a 16x16 Binary Matrix as a Diffusion Layer. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 489–503. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  13. 13.
    Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156–169. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  14. 14.
    Jakobsen, T., Knudsen, L.R.: The interpolation attack on block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Daesung Kwon
    • 1
  • Jaesung Kim
    • 2
  • Sangwoo Park
    • 1
  • Soo Hak Sung
    • 3
  • Yaekwon Sohn
    • 2
  • Jung Hwan Song
    • 4
  • Yongjin Yeom
    • 1
  • E-Joong Yoon
    • 1
  • Sangjin Lee
    • 5
  • Jaewon Lee
    • 2
  • Seongtaek Chee
    • 1
  • Daewan Han
    • 1
  • Jin Hong
    • 1
  1. 1.National Security Research InstituteDaejeonKorea
  2. 2.International Science Culture InstituteSocho-guKorea
  3. 3.Department of Computing information & mathematicsPaichai UniversityDaejeonKorea
  4. 4.Department of MathematicsHanyang UniversitySeoulKorea
  5. 5.Graduate School of Information Security Korea UniversitySeoulKorea

Personalised recommendations