Skip to main content

A block cipher method using combinations of different methods under the control of the user key

  • Conference paper
  • First Online:
  • 180 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 718))

Abstract

In this paper, we describe a 64-bit multi-round block cipher, suitable for software implementation, in which three different encryption methods are combined in a sequence determined by the user key. In this way, whilst the design is public knowledge, the actual encryption method selected by the user key is kept secret. This method has been implemented using the three block ciphers: Khufu, Loki, and a cipher by Lai and Massey. The performance and cryptanalysis results using the CRYPT-XB package for this example are provided.

This is a preview of subscription content, log in via an institution.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brown, L., Pieprzyk, J. and Seberry, J.: LOKI — a cryptographic primitive for authentication and secrecy applications. Advances in Cryptology, AUSCRYPT 90, Lecture Notes in Computer Science, 453, J. Seberry and J. Pieprzyk eds., Springer-Verlag, (1990) 229–236

    Google Scholar 

  2. Lai, X. and Massey, J.: A proposal for a new block encryption standard. Advances in Cryptology, EOROCRYPT 90, Lecture Notes in Computer Science, 473, I.B. Damgård ed., Springer-Verlag, (1990) 389–404

    Google Scholar 

  3. Merkle, R.: Fast software encryption functions. Advances in Cryptolgy, CRYPTO 90, Lecture Notes in Computer Science, 537, A.J. Menezes and S.A. Vanstone eds., Springer-Verlag, (1991) 476–501

    Google Scholar 

  4. Caelli, W., Dawson, E., Gustafson, H. and Nielsen, L.: CRYPT-XB Statistical Package Manual for Block Ciphers. Queensland University of Technology, (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Jennifer Seberry Yuliang Zheng

Rights and permissions

Reprints and permissions

Copyright information

© 1993 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Rezny, M., Trimarchi, E. (1993). A block cipher method using combinations of different methods under the control of the user key. In: Seberry, J., Zheng, Y. (eds) Advances in Cryptology — AUSCRYPT '92. AUSCRYPT 1992. Lecture Notes in Computer Science, vol 718. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-57220-1_90

Download citation

  • DOI: https://doi.org/10.1007/3-540-57220-1_90

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-57220-6

  • Online ISBN: 978-3-540-47976-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics