Skip to main content

A new byte-oriented block cipher

  • Implementation(Hard/Soft)
  • Conference paper
  • First Online:
Information Security (ISW 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1396))

Included in the following conference series:

Abstract

In this paper, a new byte-oriented block cipher with a key of length 64 bits is proposed. In the proposed cipher, the block length is 64 bits and only byte operations are utilized. The cipher structure is composed of two simple operations (exclusive-or and addition) and three cryptographically strong S-boxes (one is 8 x 8 S-box, two are 8-bit involution S-boxes) and chosen to provide necessary confusion and diffusion and facilitate both hardware and software implementation. The design principles of the proposed cipher are explained and a sample data is given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J.L.Massey, “SAFER K-64: A byte-oriented block-ciphering algorithm”, Proceedings of the Cambridge Algorithm Workshop'93, Lecture Notes in Computer Science 809 (1994)1–17.

    Google Scholar 

  2. C.E.Shannon, “Communication theory of secrecy system”, Bell Systems Technical Journal, Vol.28, (1949)656–715.

    Google Scholar 

  3. X.Yi, S.X.Cheng, “A method for obtaining cryptographically strong 8-bit involution boxes”, submitted to IEEE Communications Letters.

    Google Scholar 

  4. X.Yi, S.X.Cheng, X.H.You, K.Y.Lam, “A method for obtaining cryptographically strong 8x8 s-boxes”, Proceedings of IEEE Global Communications Conference, Globecom'97.

    Google Scholar 

  5. B.Schneier, “Description of a new variable-length key, 64-bit block cipher (Blow-fish)”, Proceedings of 1994 Fast Software Encryption, Lecture Notes in Computer Science 809 (1994)191–204.

    Google Scholar 

  6. E.Biham, “New types of cryptanalytic attacks using related keys”, Proceedings of Eurocrypt'93, LNCS 765. Journal of Cryptology, Vol.7, No.4, (1993)229–246

    Google Scholar 

  7. J. Kelsey, B. Schneier, and D. Wagner, “Key-schedule cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES,” Advances in Cryptology, Proceedings of CRYPTO 96, Lecture Notes in Computer Science 1109 (1996)237–251.

    Google Scholar 

  8. J. Kelsey, B. Schneier, and D. Wagner, “Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, newDES, RC2, and TEA”, Proceedings of ICICS'97, Springer-Verlag, November 1997.

    Google Scholar 

  9. X.Lai, J.L.Massey, “A proposal for a new block encryption standard“, Advances in Cryptology, Proceedings of EUROCRYPT'90, Lecture Notes in Computer Science 473 (1991)389–404.

    Google Scholar 

  10. X.Lai, “On the design and security of block cipher”, ETH Series in Information Processing, V.1, Konstanz: Hartung-Gorre Verlag, 1992.

    Google Scholar 

  11. A.Rueppel, “Analysis and design of stream ciphers”, Springer-Verlag, Heidelberg and New York, 1986.

    Google Scholar 

  12. A.Webster, S.Tavares, “On the design of S-boxes”, Advances in Cryptology, Proc. of CRYPTO'85, Lecture Notes in Computer Science (1986)523–534.

    Google Scholar 

  13. E.Biham, A.Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Journal of Cryptology, Vol.4, No.1, (1991)3–72

    Google Scholar 

  14. X.Lai, J.L.Massey, “Markov ciphers and differential cryptanalysis”, Advances in Cryptology, Proceedings of EUROCRYPT'91, Lecture Notes in Computer Science 547 (1991)17–38.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Eiji Okamoto George Davida Masahiro Mambo

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yi, X., Lam, K.Y., Cheng, S.X., You, X.H. (1998). A new byte-oriented block cipher. In: Okamoto, E., Davida, G., Mambo, M. (eds) Information Security. ISW 1997. Lecture Notes in Computer Science, vol 1396. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030422

Download citation

  • DOI: https://doi.org/10.1007/BFb0030422

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64382-1

  • Online ISBN: 978-3-540-69767-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics