Abstract
The block cipher CRYPTON has been proposed as a candidate algorithm for the Advanced Encryption Standard (AES). To fix some minor weakness in the key schedule and to remove some undesirable properties in S-boxes, we made some changes to the AES proposal, i.e., in the S-box construction and key scheduling. This paper presents the revised version of CRYPTON and its preliminary analysis.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham, A. Biryukov and A. Shamir, Cryptanalysis of Skipjack reduced to 31 rounds, In Advances in Cryptology-EUROCRYPT’99, Springer-Verlag, 1999.
E. Biham, A. Biryukov and A. Shamir, Miss in the middle attacks on IDEA, Khufu, and Khafre, in this proceedings.
E. Biham and A. Shamir, Differential cryptanalysis of DES-like cryptosystems, Journal of Cryptology, v. 4, 1991, pp. 3–72.
J. Borst, Weak keys of CRYPTON, public comment submited to the NIST, 1998.
C. D’Halluin, G. Bijnens, V. Rijmen and B. Preenel, Attack on six rounds of CRYPTON, in this proceedings.
J. Daemen, L. Knudsen and V. Rijmen, The block cipher Square, In Fast Software Encryption, LNCS 1267, Springer-Verlag, 1997, pp.149–171.
C. Harpes, G. Kramer and J. Massey, A generalization of linear cryptanalysis and the applicability of Matsui’s piling-up lemma, In Advances in Cryptology-EUROCRYPT’95, LNCS 921, Springer-Verlag, 1995, pp.24–38.
C. Harpes and J. Massey, Partitioning cryptanalysis, In Fast Software Encryption, LNCS 1267, Springer-Verlag, 1997, pp.13–27.
M. Hellman and S. Langford, Differential-linear cryptanalysis, In Advances in Cryptology-CRYPTO’94, LNCS 839, Springer-Verlag, 1994, pp.26–39.
H.M. Heys and S.E. Tavares, Substitution-permutation networks resistant to differential and linear cryptanalysis, J. Cryptology, 9(1), 1996, pp.1–19.
T. Jakobsen, Cryptanalysis of block ciphers with probabilistic non-linear relations of low-degree, In Advances in Cryptology-CRYPTO’98, LNCS 1462, Springer-Verlag, 1998, pp.212–222.
T. Jakobsen and L.R. Knudsen, The interpolation attack on block ciphers, In Fast Software Encryption, LNCS 1267, Springer-Verlag, 1997, pp.28–40.
J. Kelsey, B. Schneier and D. Wagner, Key-schedule cryptanalysis of IDEA, DES, GOST, SAFER, and triple-DES, In Advances in Cryptology-CRYPTO’96, LNCS 1109, Springer-Verlag, 1996, pp.237–252.
J. Kelsey, B. Schneier and D. Wagner, Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA, In Information and Communications Security, LNCS 1334, Springer-Verlag, 1997, pp.233–246.
L.R. Knudsen, Truncated and higher order differentials, In Fast Software Encryption, LNCS 1008, Springer-Verlag, 1995, pp.196–211.
L.R. Knudsen and T.A. Berson, Truncated differentials of SAFER, In Fast Software Encryption, LNCS 1039, Springer-Verlag, 1996, pp.15–26.
B.S. Kaliski Jr. and M.J.B. Robshaw, Linear cryptanalysis using multiple linear approximations, In Advances in Cryptology-CRYPTO’94, LNCS 839, Springer-Verlag, 1994, pp.26–39.
B.S. Kaliski Jr. and M.J.B. Robshaw, Linear cryptanalysis using multiple linear approximations and FEAL, In Fast Software Encryption, LNCS 1008, Springer-Verlag, 1995, pp.249–264.
L. Knudsen and M.J.B. Robshaw, Non-linear approximations in linear cryptanalysis, In Advances in Cryptology-EUROCRYPT’96, LNCS 1070, Springer-Verlag, 1996, pp.252–267.
X. Lai, On the design and security of block ciphers, PhD thesis, ETH, Zurich, 1992.
X. Lai and J.L. Massey, Markov ciphers and differential cryptanalysis, In Advances in Cryptology-EUROCRYPT’91, LNCS 547, Springer-Verlag, 1991, pp.17–38.
C.H. Lim, CRYPTON: A new 128-bit block cipher, NIST AES Proposal, June 1998.
M. Matsui, Linear cryptanalysis method for DES cipher, In Advances in Cryptology-EUROCRYPT’93, LNCS 765, Springer-Verlag, 1994, pp.386–397.
D. Wagner, The boomerang attack, in this proceedings.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lim, C.H. (1999). A Revised Version of CRYPTON: CRYPTON V1.0. In: Knudsen, L. (eds) Fast Software Encryption. FSE 1999. Lecture Notes in Computer Science, vol 1636. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48519-8_3
Download citation
DOI: https://doi.org/10.1007/3-540-48519-8_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66226-6
Online ISBN: 978-3-540-48519-3
eBook Packages: Springer Book Archive