Abstract
DES and triple-DES are two well-known and popular encryption algorithms, but they both have the same drawback: their block size is limited to 64 bits. While the cryptographic community is working hard to select and evaluate candidates and finalists for the AES (Advanced Encryption Standard) contest launched by NIST in 1997, it might be of interest to propose a secure and simple double block-length encryption algorithm. More than in terms of key length and block size, our Universal Encryption Standard is a new construction that remains totally compliant with DES and triple-DES specifications as well as with AES requirements.
Chapter PDF
Similar content being viewed by others
References
ANSI draft X9.52, “Triple Data Encryption Algorithm Modes of Operation,” Revision 6.0, 1996.
E. Biham, “On modes of operation,” Fast Software Encryption’93, LNCS 809, Springer-Verlag, 1994, pp. 116–120.
E. Biham, “Cryptanalysis of multiple modes of operation,” ASIACRYPT’94, LNCS 917, Springer-Verlag, 1994, pp. 278–292.
E. Biham, “Cryptanalysis of triple-modes of operation,” Technion Technical Report CS0885, 1996.
E. Biham, L. R. Knudsen, “Cryptanalysis of the ANSI X9.52 CBCM mode,” EU-ROCRYPT’98, LNCS 1403, Springer-Verlag, 1998, pp. 100–111.
E. Biham, A. Shamir, “Differential Cryptanalysis of the Data Encryption Standard,” Springer-Verlag, 1993.
The Electronic Frontier Foundation, “Cracking DES. Secrets of Encryption Research, Wiretap Politics & Chip Design,” O’Reilly, May 1998.
FIPS 46, “Data Encryption Standard,” US Department of Commerce, National Bureau of Standards, 1977 (revised as FIPS 46-1:1988; FIPS 46-2:1993).
FIPS 81, “DES Modes of Operation,” US Department of Commerce, National Bureau of Standards, 1980.
H. Handschuh, B. Preneel, “On the security of double and 2-key triple modes of operation”, Fast Software Encryption’99, Springer-Verlag, 1999, pp. 215–230.
B. S. Kaliski, M.J.B. Robshaw, “Multiple encryption: Weighing security and performance,” Dr. Dobb’s Journal, January 1996, pp. 123–127.
J. Kelsey, B. Schneier, “Key-Schedule Cryptanalysis of DEAL,” in these proceedings.
J. Kilian, P. Rogaway, “How to protect DES against exhaustive key search, CRYPTO’96, LNCS 1109, Springer-Verlag, 1996, pp. 252–267.
L. R. Knudsen, “Block Ciphers — Analysis, Design and Applications,” PhD thesis, Aarhus University, Denmark, 1994.
L. R. Knudsen, “DEAL: a 128-bit block cipher,” AES submission, 1998.
L. Knudsen, “On Expanding the Block Length of DES,” unpublished manuscript, nov. 98.
S. Lucks, “Attacking triple encryption,” Fast Software Encryption’98, LNCS 1372, Springer-Verlag, 1998, pp. 239–253.
S. Lucks, “On the security of the 128-bit block cipher DEAL,” preprint, 1998.
M. Matsui, “Linear cryptanalysis method for DES cipher,” EUROCRYPT’93, LNCS 765, Springer-Verlag, 1993, pp. 386–397.
B. Schneier, Applied Cryptography, Wiley & Sons, 1995, pp. 364.
S. Vaudenay, “On the need for multipermutations: Cryptanalysis of MD4 and SAFER,” Fast Software Encryption 2, LNCS 1008, Springer-Verlag, 1995, pp. 286–297.
P. C. van Oorschot, M. J. Wiener, “A known-plaintext attack on two-key triple encryption,” EUROCRYPT’90, LNCS 473, 1990, pp. 318–325.
P. C. van Oorschot, M. J. Wiener, “Improving implementable meet-in-the-middle attacks by orders of magnitude,” CRYPTO’96, LNCS 1109, 1996, pp. 229–236.
D. Wagner, “Cryptanalysis of some recently-proposed multiple modes of operation,” Fast Software Encryption’98, LNCS 1372, Springer-Verlag, 1998, pp. 254–269.
M.J. Wiener, “Efficient DES key search,” Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto’93 and reprinted in W. Stallings, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996, pp. 31–79.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Handschuh, H., Vaudenay, S. (2000). A Universal Encryption Standard. In: Heys, H., Adams, C. (eds) Selected Areas in Cryptography. SAC 1999. Lecture Notes in Computer Science, vol 1758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46513-8_1
Download citation
DOI: https://doi.org/10.1007/3-540-46513-8_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67185-5
Online ISBN: 978-3-540-46513-3
eBook Packages: Springer Book Archive