Advertisement

A new byte-oriented block cipher

  • X. Yi
  • K. Y. Lam
  • S. X. Cheng
  • X. H. You
Implementation(Hard/Soft)
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1396)

Abstract

In this paper, a new byte-oriented block cipher with a key of length 64 bits is proposed. In the proposed cipher, the block length is 64 bits and only byte operations are utilized. The cipher structure is composed of two simple operations (exclusive-or and addition) and three cryptographically strong S-boxes (one is 8 x 8 S-box, two are 8-bit involution S-boxes) and chosen to provide necessary confusion and diffusion and facilitate both hardware and software implementation. The design principles of the proposed cipher are explained and a sample data is given.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J.L.Massey, “SAFER K-64: A byte-oriented block-ciphering algorithm”, Proceedings of the Cambridge Algorithm Workshop'93, Lecture Notes in Computer Science 809 (1994)1–17.Google Scholar
  2. 2.
    C.E.Shannon, “Communication theory of secrecy system”, Bell Systems Technical Journal, Vol.28, (1949)656–715.Google Scholar
  3. 3.
    X.Yi, S.X.Cheng, “A method for obtaining cryptographically strong 8-bit involution boxes”, submitted to IEEE Communications Letters.Google Scholar
  4. 4.
    X.Yi, S.X.Cheng, X.H.You, K.Y.Lam, “A method for obtaining cryptographically strong 8x8 s-boxes”, Proceedings of IEEE Global Communications Conference, Globecom'97.Google Scholar
  5. 5.
    B.Schneier, “Description of a new variable-length key, 64-bit block cipher (Blow-fish)”, Proceedings of 1994 Fast Software Encryption, Lecture Notes in Computer Science 809 (1994)191–204.Google Scholar
  6. 6.
    E.Biham, “New types of cryptanalytic attacks using related keys”, Proceedings of Eurocrypt'93, LNCS 765. Journal of Cryptology, Vol.7, No.4, (1993)229–246Google Scholar
  7. 7.
    J. Kelsey, B. Schneier, and D. Wagner, “Key-schedule cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES,” Advances in Cryptology, Proceedings of CRYPTO 96, Lecture Notes in Computer Science 1109 (1996)237–251.Google Scholar
  8. 8.
    J. Kelsey, B. Schneier, and D. Wagner, “Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, newDES, RC2, and TEA”, Proceedings of ICICS'97, Springer-Verlag, November 1997.Google Scholar
  9. 9.
    X.Lai, J.L.Massey, “A proposal for a new block encryption standard“, Advances in Cryptology, Proceedings of EUROCRYPT'90, Lecture Notes in Computer Science 473 (1991)389–404.Google Scholar
  10. 10.
    X.Lai, “On the design and security of block cipher”, ETH Series in Information Processing, V.1, Konstanz: Hartung-Gorre Verlag, 1992.Google Scholar
  11. 11.
    A.Rueppel, “Analysis and design of stream ciphers”, Springer-Verlag, Heidelberg and New York, 1986.Google Scholar
  12. 12.
    A.Webster, S.Tavares, “On the design of S-boxes”, Advances in Cryptology, Proc. of CRYPTO'85, Lecture Notes in Computer Science (1986)523–534.Google Scholar
  13. 13.
    E.Biham, A.Shamir, “Differential cryptanalysis of DES-like cryptosystems”, Journal of Cryptology, Vol.4, No.1, (1991)3–72Google Scholar
  14. 14.
    X.Lai, J.L.Massey, “Markov ciphers and differential cryptanalysis”, Advances in Cryptology, Proceedings of EUROCRYPT'91, Lecture Notes in Computer Science 547 (1991)17–38.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • X. Yi
    • 1
  • K. Y. Lam
    • 1
  • S. X. Cheng
    • 2
  • X. H. You
    • 2
  1. 1.Department of Information Systems and Computer ScienceNational University of SingaporeSingapore
  2. 2.National Mobile Communications Research LaboratorySoutheast UniversityNanjingP.R.China

Personalised recommendations