Abstract
This paper examines proposals for three cryptographic primitives: block ciphers, stream ciphers, and hash functions. It provides an overview of the design principles of a large number of recent proposals, which includes the global structure, the number of rounds, the way of introducing non-linearity and diffusion, and the key schedule. The software performance of about twenty primitives is compared based on highly optimized implementations for the Pentium. The goal of the paper is to provided a technical perspective on the wide variety of primitives that exist today.
F.W.O. postdoctoral researcher, sponsored by the Fund for Scientific Research - Flanders (Belgium).
F.W.O. research assistant, sponsored by the Fund for Scientific Research - Flanders (Belgium).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
C.M. Adams, “Simple and effective key scheduling for symmetric ciphers,” Proceedings of SAC’94, Workshop on Selected Areas in Cryptography, pp. 129–133.
C.M. Adams, “Constructing symmetric ciphers using the CAST design procedure,” Designs, Codes, and Cryptography, Vol. 12, No. 3, November 1997, pp. 71–104.
C.M. Adams, S.E. Tavares, “The structured design of cryptographically good S-boxes,” Journal of Cryptology, Vol. 3, No. 1, 1990, pp. 27–42.
C.M. Adams, S.E. Tavares, “Designing S-boxes for ciphers resistant to differential cryptanalysis,” Proceedings of the 3rd Symposium on State and Progress of Research in Cryptography, W. Wolfowicz, Ed., Fondazione Ugo Bordoni, 1993, pp. 181–190.
R. Anderson, E. Biham, “Tiger: a fast new hash function,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 89–97.
R. Anderson, E. Biham, “Two practical and provably secure block ciphers: BEAR and LION,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 113–120.
K. Aoki, K. Ohta, “Differential-linear cryptanalysis of FEAL-8,” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 1, January 1996.
E. Biham, A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
M. Blaze, W. Diffie, R.L. Rivest, B. Schneier, T. Shimomura, E. Thompson, M. Wiener, “Minimal key lengths for symmetric ciphers to provide adequate commercial security,” January 1996.
J. Borst, L. R. Knudsen, V. Rijmen, “Two attacks on reduced IDEA,” Advances in Cryptology, Proceedings Eurocrypt’97, LNCS 1233, W. Fumy, Ed., Springer-Verlag, 1997, pp. 1–13.
A. Bosselaers, R. Govaerts, J. Vandewalle, “Fast hashing on the Pentium,” Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 298–312.
A. Bosselaers, H. Dobbertin, B. Preneel, “The RIPEMD-160 cryptographic hash function,” Dr. Dobb’s Journal, Vol. 22, No. 1, January 1997, pp. 24–28.
A. Bosselaers, R. Govaerts, J. Vandewalle, “SHA: a design for parallel architectures?,” Advances in Cryptology, Proceedings Eurocrypt’97, LNCS 1233, W. Fumy, Ed., Springer-Verlag, 1997, pp. 348–362.
A. Bosselaers, “Even faster hashing on the Pentium,” Presented at the rump session of Eurocrypt’97, Konstanz, Germany, May 12–15, 1997, and updated on November 13, 1997. Available from ftp://www.esat.kuleuven.ac.be/pub/COSIC/bosselae/pentiumplus.ps.gz.
L. Brown, M. Kwan, J. Pieprzyk, J. Seberry, “ Improving resistance to differential cryptanalysis and the redesign of LOKI,” Advances in Cryptology, Proceedings Asiacrypt’91, LNCS 739, H. Imai, R.L. Rivest, and T. Matsumoto, Eds., Springer-Verlag, 1993, pp. 36–50.
C. Charnes, L. O’Connor, J. Pieprzyk, R. Safavi-Naini, and Y. Zheng, “Comments on Soviet encryption algorithm,” Advances in Cryptology, Proceedings Eurocrypt’94, LNCS 950, A. De Santis, Ed., Springer-Verlag, 1995, pp. 433–438.
D. Chaum, J.-H. Evertse, “Cryptanalysis of DES with a reduced number of rounds — sequences of linear factors in block ciphers,” Advances in Cryptology, Proceedings Crypto’85, LNCS 218, H.C. Williams, Ed., Springer-Verlag, 1985, pp. 192–211.
C.S.K. Clapp, “Optimizing a fast stream cipher for VLIW, SIMD, and superscalar processors,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 273–287.
D. Cohen, “On holy wars and a plea for peace,” IEEE Computer, Vol. 14, No. 10, October 1981, pp. 49–54.
D. Coppersmith, D.B. Johnson, S.M. Matyas, “A proposed mode for triple-DES encryption,” IBM Journal of Research & Development, Vol. 40, 1996, pp. 253–261.
T. W. Cusick, M. C. Wood, “The REDOC-II cryptosystem,” Advances in Cryptology, Proceedings Crypto’90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 545–563.
J. Daemen, “Cipher and Hash Function Design. Strategies Based on Linear and Differential Cryptanalysis,” Doctoral Dissertation, Katholieke Universiteit Leuven, 1995.
J. Daemen, R. Govaerts, J. Vandewalle, “Resynchronization weaknesses in synchronous stream ciphers,” Advances in Cryptology, Proceedings Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 159–169.
J. Daemen, R. Govaerts, J. Vandewalle, “A new approach to block cipher design,” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 18–32.
J. Daemen, L.R. Knudsen, V. Rijmen, “The block cipher Square,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 149–165.
J. Daemen, L.R. Knudsen, V. Rijmen, “The block cipher Square algorithm,” Dr. Dobb’s Journal, Vol. 22, No. 10, October 1997, pp. 54–57.
H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160, a strengthened version of RIPEMD,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 71–82.
H. Feistel, “Cryptography and computer privacy,” Scientific American, Vol. 228, No. 5, May 1973, pp. 15–23.
FIPS 46, “Data Encryption Standard,” Federal Information Processing Standard (FIPS), Publication 46, National Bureau of Standards, U.S. Department of Commerce, Washington D.C., January 1977.
FIPS 180-1, “Secure Hash Standard,” Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 1995.
H. Gilbert, P. Chauvaud, “A chosen plaintext attack of the 16-round Khufu cryptosystem,” Advances in Cryptology, Proceedings Crypto’94, LNCS 839, Y. Desmedt, Ed., Springer-Verlag, 1994, pp. 359–368.
J. Golić, “Linear statistical weakness of alleged RC4 keystream generator,” Advances in Cryptology, Proceedings Eurocrypt’97, LNCS 1233, W. Fumy, Ed., Springer-Verlag, 1997, pp. 226–238.
S. Halevi, H. Krawczyk, “MMH: Software message authentication in the Gbit/second rates,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 172–189.
H. Handschuh, H. Gilbert, “χ2 Cryptanalysis of the SEAL encryption algorithm,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 1–12.
ISO/IEC 10116, “Information technology-Security techniques-Modes of operation of an n-bit block cipher algorithm,” IS 10116, 1991.
T. Jakobsen, L. Knudsen, “The interpolation attack on block ciphers,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 28–40.
B. S. Kaliski, “The MD2 Message-Digest algorithm,” Request for Comments (RFC) 1319, Internet Activities Board, Internet Privacy Task Force, April 1992.
J. Kelsey, B. Schneier, D. Wagner, “Key-schedule cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES,” Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 237–252.
J. Kilian, P. Rogaway, “How to protect DES against exhaustive key search,” Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 252–267.
L.R. Knudsen, “Block ciphers-analysis, design and applications,” PhD. Thesis, DAIMI PB 485, Aarhus University, 1994.
L.R. Knudsen, “Block ciphers-a survey,” This Volume, pp. 19–49.
L.R. Knudsen, “A key-schedule weakness in SAFER-K64,” Advances in Cryptology, Proceedings Crypto’95, LNCS 963, D. Coppersmith, Ed., Springer-Verlag, 1995, pp. 274–286.
L.R. Knudsen, T.A. Berson, “Truncated differentials of SAFER,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 15–26.
L.R. Knudsen, W. Meier, “Improved differential attack on RC5,” Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 216–228.
L.R. Knudsen, “On the security of Bear & Lion & ladder-DES,” Presented at the rump session of the Fast Software Encryption Workshop, Haifa, Israel, January 20–22, 1997.
X. Lai, J.L. Massey, S. Murphy, “Markov ciphers and differential cryptanalysis,” Advances in Cryptology, Proceedings Eurocrypt’91, LNCS 547, D. W. Davies, Ed., Springer-Verlag, 1991, pp. 17–38.
R. Lee, “Subword parallelism with MAX-2,” IEEE Micro, Vol. 16, No. 4, August 1996, pp. 51–59.
H. Lipmaa, “IDEA: A cipher for multimedia architectures?,” Selected Areas in Cryptography, LNCS, Springer-Verlag, 199
M. Luby, C. Rackoff, “How to construct pseudorandom permutations from pseudorandom functions,” SIAM Journal on Computing, Vol 17, No. 2, April 1988, pp. 373–386.
J.L. Massey, “SAFER-K64: A byte oriented block-ciphering algorithm,” Fast Software Encryption, LNCS 890, R. Anderson, Ed., Springer-Verlag, 1994, pp. 1–17.
J.L. Massey, “SAFER K-64: One year later,” Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 212–241.
M. Matsui, “Linear cryptanalysis method for DES cipher,” Advances in Cryptology, Proceedings Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 386–397.
M. Matsui, “New block encryption algorithm MISTY,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 54–68.
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
R.C. Merkle, Secrecy, Authentication, and Public Key Systems, UMI Research Press, Ann Arbor, Michigan, 1979.
R. Merkle, “Fast software encryption functions,” Advances in Cryptology, Proceedings Crypto’90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 476–501.
R. Merkle, “A fast software one-way hash function,” Journal of Cryptology, Vol. 3, No. 1, 1990, pp. 43–58.
“MIPS extension for digital media with 3D,” MIPS Technologies, Inc., March 12, 1997.
S. Miyaguchi, “The FEAL cipher family,” Advances in Cryptology, Proceedings Crypto’90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 627–638.
S. Moriai, K. Aoki, K. Ohta, “The best linear expression search of FEAL,” IEICE Trans. on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E79-A, No. 1, January 1996.
M. Naor, O. Reingold, “On the construction of pseudo-random permutations: Luby-Rackoff revisited,” Security in Communication Networks, Amalfi (I), September 16–17, 1996.
K. Nyberg, L.R. Knudsen, “Provable security against a differential attack,” Journal of Cryptology, Vol. 8, No. 1, 1995, pp. 27–38.
K. Nyberg, “Generalized Feistel networks,” Advances in Cryptology, Proceedings Asiacrypt’96, LNCS 1163, K. Kim and T. Matsumoto, Eds., Springer-Verlag, 1996, pp. 91–104.
A. Peleg, U. Weiser, “MMX technology extension to the Intel architecture,” IEEE Micro, Vol. 16, No. 4, August 1996, pp. 42–50.
B. Preneel, “Hash functions and MACs: state of the art,” This Volume, pp. 50–105.
V. Rijmen, “Cryptanalysis and design of iterated block ciphers,” Doctoral Dissertation, Katholieke Universiteit Leuven, 1997.
V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, E. De Win, “The cipher SHARK,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 99–111.
V. Rijmen, B. Preneel, “A family of trapdoor ciphers,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 139–148.
V. Rijmen, B. Preneel, E. De Win, “On weaknesses of non-surjective round functions,” Designs, Codes, and Cryptography, Vol. 12, No. 3, November 1997, pp. 251–264.
R.L. Rivest, “The MD4 message-digest algorithm,” Request for Comments (RFC) 1320, Internet Activities Board, Internet Privacy Task Force, April 1992.
R.L. Rivest, “The MD5 message-digest algorithm,” Request for Comments (RFC) 1321, Internet Activities Board, Internet Privacy Task Force, April 1992.
R.L. Rivest, “The RC5 encryption algorithm,” Fast Software Encryption, LNCS 1008, B. Preneel, Ed., Springer-Verlag, 1995, pp. 86–96.
R.L. Rivest, “All-or-nothing encryption and the package transform,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 210–218.
Ph. Rogaway, D. Coppersmith, “A software-optimized encryption algorithm,” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 56–63.
Ph. Rogaway, D. Coppersmith, “A software-optimized encryption algorithm,” Journal of Cryptology, to appear. Available from http://www.cs.ucdavis.edu/~rogaway/papers/seal.ps.
A. Roos, “A class of weak keys in the RC4 stream cipher,” preliminary draft, 1996.
P. Rubinfeld, B. Rose, M. McCallig, “Motion Video Instruction Extensions for Alpha,” Digital Equipment Corporation, October 18, 1996.
R.A. Rueppel, “Stream ciphers,” in “Contemporary Cryptology: The Science of Information Integrity,” G.J. Simmons, Ed., IEEE Press, 1991, pp. 65–134.
K. Sakurai, S. Furuya, “Improving linear cryptanalysis of LOKI91 by probabilistic counting method,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 114–133.
B. Schneier, “Description of a new variable-length key, 64-bit block cipher (Blowfish),” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 191–204.
B. Schneier, J. Kelsey, “Unbalanced Feistel networks and block cipher design,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 121–144.
B. Schneier, D. Whiting, “Fast software encryption: designing encryption algorithms for optimal software speed on the Intel Pentium processor,” Fast Software Encryption, LNCS 1267, E. Biham, Ed., Springer-Verlag, 1997, pp. 242–259.
C.E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, Vol. 28, No. 4, 1949, pp. 656–715.
A. Shimizu, S. Miyaguchi, “Fast data encipherment algorithm FEAL,” Advances in Cryptology, Proceedings Eurocrypt’87, LNCS 304, D. Chaum and W.L. Price, Eds., Springer-Verlag, 1988, pp. 267–278.
G.A. Slavenburg, S. Rathnam, H. Dijkstra, “The Trimedia TM-1 PCI VLIW media processor,” Hot Chips VIII Conference, Stanford University, Palo Alto, CA, 1996.
M. Tremblay, J.M. O’Connor, V. Narayanan, L. He, “VIS speeds new media processing,” IEEE Micro, Vol. 16, No. 4, August 1996, pp. 10–20.
W. Tuchman, “Hellman presents no shortcut solutions to DES,” IEEE Spectrum, Vol. 16, No. 7, July 1979, pp. 40–41.
P.C. van Oorschot, M. Wiener, “A known-plaintext attack on two-key triple encryption,” Advances in Cryptology, Proceedings Eurocrypt’90, LNCS 473, I.B. Damgård, Ed., Springer-Verlag, 1991, pp. 318–325.
S. Vaudenay, “On the weak keys of Blowfish,” Fast Software Encryption, LNCS 1039, D. Gollmann, Ed., Springer-Verlag, 1996, pp. 27–32.
D.J. Wheeler, “A bulk data encryption algorithm,” Fast Software Encryption, LNCS 809, R. Anderson, Ed., Springer-Verlag, 1994, pp. 127–134.
D. Whiting, personal communication, May 1997.
M.J. Wiener, “Efficient DES key search,” Technical Report TR-244, School of Computer Science, Carleton University, Ottawa, Canada, May 1994. Presented at the rump session of Crypto’93 and reprinted in W. Stallings, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996, pp. 31–79.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Preneel, B., Rijmen, V., Bosselaers, A. (1998). Recent Developments in the Design of Conventional Cryptographic Algorithms. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_4
Download citation
DOI: https://doi.org/10.1007/3-540-49248-8_4
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65474-2
Online ISBN: 978-3-540-49248-1
eBook Packages: Springer Book Archive