Advertisement

A block cipher method using combinations of different methods under the control of the user key

  • Mike Rezny
  • Eddie Trimarchi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 718)

Abstract

In this paper, we describe a 64-bit multi-round block cipher, suitable for software implementation, in which three different encryption methods are combined in a sequence determined by the user key. In this way, whilst the design is public knowledge, the actual encryption method selected by the user key is kept secret. This method has been implemented using the three block ciphers: Khufu, Loki, and a cipher by Lai and Massey. The performance and cryptanalysis results using the CRYPT-XB package for this example are provided.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Brown, L., Pieprzyk, J. and Seberry, J.: LOKI — a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology, AUSCRYPT 90, Lecture Notes in Computer Science, 453, J. Seberry and J. Pieprzyk eds., Springer-Verlag, (1990) 229–236Google Scholar
  2. 2.
    Lai, X. and Massey, J.: A proposal for a new block encryption standard. Advances in Cryptology, EOROCRYPT 90, Lecture Notes in Computer Science, 473, I.B. Damgård ed., Springer-Verlag, (1990) 389–404Google Scholar
  3. 3.
    Merkle, R.: Fast software encryption functions. Advances in Cryptolgy, CRYPTO 90, Lecture Notes in Computer Science, 537, A.J. Menezes and S.A. Vanstone eds., Springer-Verlag, (1991) 476–501Google Scholar
  4. 4.
    Caelli, W., Dawson, E., Gustafson, H. and Nielsen, L.: CRYPT-XB Statistical Package Manual for Block Ciphers. Queensland University of Technology, (1992)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1993

Authors and Affiliations

  • Mike Rezny
    • 1
  • Eddie Trimarchi
    • 1
  1. 1.Queensland University of TechnologyAustralia

Personalised recommendations