Constructing Symmetric Ciphers Using the CAST Design Procedure

被引:39
作者
Adams C.M. [1 ]
机构
[1] Entrust Technologies, Ottawa, Ont. K1V 1A7
关键词
Block ciphers; Design of encryption algorithms; Differential cryptanalysis; Key scheduling; Linear cryptanalysis; Substitution boxes;
D O I
10.1023/A:1008229029587
中图分类号
学科分类号
摘要
This paper describes the CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems which appear to have good resistance to differential cryptanalysis, linear cryptanalysis, and related-key cryptanalysis, along with a number of other desirable cryptographic properties. Details of the design choices in the procedure are given, including those regarding the component substitution boxes (s-boxes), the overall framework, the key schedule, and the round function. An example CAST cipher, an output of this design procedure, is presented as an aid to understanding the concepts and to encourage detailed analysis by the cryptologic community.
引用
收藏
页码:283 / 316
页数:33
相关论文
共 58 条
[1]  
Adams C.M., A Formal and Practical Design Procedure for Substitution-permutation Network Cryptosystems, (1990)
[2]  
Adams C.M., Tavares S.E., The Use of Bent Sequences to Achieve Higher-order Strict Avalanche Criterion in S-box Design, (1990)
[3]  
Adams C.M., Tavares S.E., Generating and counting binary bent sequences, IEEE Transactions on Information Theory, IT-36, pp. 1170-1173, (1990)
[4]  
Adams C.M., On immunity against Biham and Shamir's "Differential Cryptanalysis, Information Processing Letters, 41, pp. 77-80, (1992)
[5]  
Adams C.M., Tavares S.E., Designing s-boxes for ciphers resistant to differential cryptanalysis, Proceedings of the 3rd Symposium on the State and Progress of Research in Cryptography, pp. 181-190, (1993)
[6]  
Adams C.M., Simple and effective key scheduling for symmetric ciphers, Workshop Record of the Workshop on Selected Areas in Cryptography (SAC 94), pp. 129-133, (1994)
[7]  
Adams C.M., Designing DES-like ciphers with guaranteed resistance to differential and linear attacks, Workshop Record of the Workshop on Selected Areas in Cryptography (SAC 95), pp. 133-144, (1995)
[8]  
Biham E., Shamir A., Differential Cryptanalysis of the Data Encryption Standard, (1993)
[9]  
Biham E., New types of cryptanalytic attacks using related keys, Advances in Cryptology: Proc. of Eurocrypt '93, pp. 398-409, (1994)
[10]  
Brown L., Pieprzyk J., Seberry J., LOKI - A cryptographic primitive for authentication and secrecy applications, Advances in Cryptology: Proc. of Auscrypt '90, pp. 229-236, (1990)