Lai-Massey cipher designs : history, design criteria and cryptanalysis /

This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysi...

Full description

Saved in:
Bibliographic Details
Main Authors: Nakahara, Jorge, Jr
Published: Springer,
Publisher Address: Cham, Switzerland :
Publication Dates: [2018]
Literature type: Book
Language: English
Subjects:
Summary: This book provides the first extensive survey of block ciphers following the Lai-Massey design paradigm. After the introduction, with historical remarks, the author structures the book into a chapter on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis of these ciphers, and another chapter on new cipher designs. The appendices include surveys of cryptographic substitution boxes and of MDS codes. This comprehensive treatment can serve as a reference source for researchers, students and practitioners.
Carrier Form: xvii, 726 pages : illustrations ; 25 cm
Bibliography: Includes bibliographical references and index.
ISBN: 9783319682723
3319682725
Index Number: Z104
CLC: TN918.2
TN918.1
Call Number: TN918.1/N163
Contents: Intro; Preface; List of Acronyms; List of Symbols; Contents; Chapter 1 Introduction; Abstract; 1.1 Symmetric and Asymmetric Ciphers; 1.2 Iterated (or Product) Ciphers; 1.3 Symmetric Cryptosystems; 1.4 Entropy; 1.5 Confusion and Diffusion; 1.6 Security Assumptions and Threat Models; 1.7 PRP and SPRP; 1.8 Modes of Operation; 1.9 Unconditional Security; 1.10 The Origins of the MESH Ciphers; References; Chapter 2 Lai-Massey Block Ciphers; Abstract; 2.1 The PES Block Cipher; 2.1.1 Encryption and Decryption Frameworks; 2.1.2 Key Schedule Algorithm; 2.2 The IDEA Block Cipher.
2.2.1 Encryption and Decryption Frameworks2.2.2 Key Schedule Algorithm; 2.3 The MESH Block Ciphers; 2.3.1 Encryption and Decryption Frameworks of MESH-64; 2.3.2 Key Schedule Algorithm of MESH-64; 2.3.3 Encryption and Decryption Frameworks of MESH-96; 2.3.4 Key Schedule Algorithm of MESH-96; 2.3.5 Encryption and Decryption Frameworks of MESH-128; 2.3.6 Key Schedule Algorithm of MESH-128; 2.3.7 Encryption and Decryption Frameworks of MESH-64(8); 2.3.8 Key Schedule Algorithm of MESH-64(8); 2.3.9 Encryption and Decryption Frameworks of MESH-128(8); 2.3.10 Key Schedule Algorithm of MESH-128(8).
2.4 The RIDEA Block Cipher2.4.1 Encryption and Decryption Frameworks; 2.4.2 Key Schedule Algorithm; 2.5 The WIDEA- Block Ciphers; 2.5.1 Encryption and Decryption Frameworks; 2.5.2 Key Schedule Algorithms; 2.6 The FOX/IDEA-NXT Block Ciphers; 2.6.1 Encryption and Decryption Frameworks; 2.6.2 Key Schedule Algorithms; 2.7 The REESSE3+ Block Cipher; 2.7.1 Encryption and Decryption Frameworks; 2.7.2 Key Schedule Algorithm; 2.8 The IDEA* Block Cipher; 2.8.1 Encryption and Decryption Frameworks; 2.8.2 Key Schedule Algorithm; 2.9 The Yi's Block Cipher; 2.9.1 Encryption and Decryption Frameworks.
2.9.2 Key Schedule Algorithm2.10 The Bel-T Block Cipher; 2.10.1 Encryption and Decryption Frameworks; 2.10.2 Key Schedule Algorithm; References; Chapter 3 Attacks; Abstract; 3.1 Exhaustive Search (Brute Force) Attack; 3.2 Dictionary Attack; 3.3 Birthday-Paradox Attacks; 3.3.1 Generalized Birthday Paradox Attack; 3.4 Time-Memory Trade-Off Attacks; 3.4.1 Hellman's Attack; 3.4.2 Time/Memory/Data Trade-Off Attacks; 3.5 Differential Cryptanalysis; 3.5.1 DC of PES Under Weak-Key Assumptions; 3.5.1.1 Key-Recovery Attacks; 3.5.2 DC of IDEA Under Weak-Key Assumptions; 3.5.2.1 Key-Recovery Attacks.
3.5.3 DC of MESH-64 Under Weak-Key Assumptions3.5.4 DC of MESH-96 Under Weak-Key Assumptions; 3.5.5 DC of MESH-128 Under Weak-Key Assumptions; 3.5.6 DC of MESH-64(8) Under Weak-Key Assumptions; 3.5.7 DC of MESH-128(8) Under Weak-Key Assumptions; 3.5.8 DC of WIDEA-n Under Weak-Key Assumptions; 3.5.8.1 Differential Attack Using One IDEA Instance Only; 3.5.8.2 Differential Attack Using All IDEA Instances; 3.5.8.3 WIDEA-n in Davies-Meyer Mode; 3.5.8.4 Weak Keys; 3.5.8.5 Weak Keys in WIDEA-4; 3.5.8.6 Weak keys in WIDEA-8; 3.5.9 DC of RIDEA Under Weak-Key Assumptions.