Abstract
In this paper, a new byte-oriented block cipher with a key of length 64 bits is proposed. In the proposed cipher, the block length is 64 bits and only byte operations are utilized. The cipher structure is composed of two simple operations (exclusive-or and addition) and three cryptographically strong S-boxes (one is 8 x 8 S-box, two are 8-bit involution S-boxes) and chosen to provide necessary confusion and diffusion and facilitate both hardware and software implementation. The design principles of the proposed cipher are explained and a sample data is given.
Preview
Unable to display preview. Download preview PDF.
References
J.L.Massey, “SAFER K-64: A byte-oriented block-ciphering algorithm”, Proceedings of the Cambridge Algorithm Workshop'93, Lecture Notes in Computer Science 809 (1994)1–17.
C.E.Shannon, “Communication theory of secrecy system”, Bell Systems Technical Journal, Vol.28, (1949)656–715.
X.Yi, S.X.Cheng, “A method for obtaining cryptographically strong 8-bit involution boxes”, submitted to IEEE Communications Letters.
X.Yi, S.X.Cheng, X.H.You, K.Y.Lam, “A method for obtaining cryptographically strong 8x8 s-boxes”, Proceedings of IEEE Global Communications Conference, Globecom'97.
B.Schneier, “Description of a new variable-length key, 64-bit block cipher (Blow-fish)”, Proceedings of 1994 Fast Software Encryption, Lecture Notes in Computer Science 809 (1994)191–204.
E.Biham, “New types of cryptanalytic attacks using related keys”, Proceedings of Eurocrypt'93, LNCS 765. Journal of Cryptology, Vol.7, No.4, (1993)229–246
J. Kelsey, B. Schneier, and D. Wagner, “Key-schedule cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES,” Advances in Cryptology, Proceedings of CRYPTO 96, Lecture Notes in Computer Science 1109 (1996)237–251.
J. Kelsey, B. Schneier, and D. Wagner, “Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, newDES, RC2, and TEA”, Proceedings of ICICS'97, Springer-Verlag, November 1997.
X.Lai, J.L.Massey, “A proposal for a new block encryption standard“, Advances in Cryptology, Proceedings of EUROCRYPT'90, Lecture Notes in Computer Science 473 (1991)389–404.
X.Lai, “On the design and security of block cipher”, ETH Series in Information Processing, V.1, Konstanz: Hartung-Gorre Verlag, 1992.
A.Rueppel, “Analysis and design of stream ciphers”, Springer-Verlag, Heidelberg and New York, 1986.
A.Webster, S.Tavares, “On the design of S-boxes”, Advances in Cryptology, Proc. of CRYPTO'85, Lecture Notes in Computer Science (1986)523–534.
E.Biham, A.Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Journal of Cryptology, Vol.4, No.1, (1991)3–72
X.Lai, J.L.Massey, “Markov ciphers and differential cryptanalysis”, Advances in Cryptology, Proceedings of EUROCRYPT'91, Lecture Notes in Computer Science 547 (1991)17–38.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yi, X., Lam, K.Y., Cheng, S.X., You, X.H. (1998). A new byte-oriented block cipher. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030422
Download citation
DOI: https://doi.org/10.1007/BFb0030422
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64382-1
Online ISBN: 978-3-540-69767-1
eBook Packages: Springer Book Archive