CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On the security of the IDEA block cipher
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On Weaknesses of Non–surjective Round Functions
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
PGP: Pretty Good Privacy
Handbook of Applied Cryptography
Handbook of Applied Cryptography
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Square-like Attacks on Reduced Rounds of IDEA
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Higher order correlation attacks, XL algorithm and cryptanalysis of Toyocrypt
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Hi-index | 0.00 |
This paper describes new variants of the MESH block ciphers, that use the same group operations of the IDEA cipher but operate on 8-bit words, and are estimated to be faster than the AES on 8-bit processors. These results corroborate the high flexibility of the MESH cipher design, demonstrating their high adaptability to 8-bit smart card processors, such as the 8051. All the design features of the original 16-bit word-oriented MESH ciphers were preserved for the 8-bit variants: complete diffusion in a single round; MA-boxes alternating modular addition and multiplication; asymmetric key-mixing layers for odd and even rounds; new key schedule algorithms with fast key avalanche; the same computational framework holds for encryption and decryption. Preliminary Square and algebraic attack results are described, and resistance to other modern cryptanalytic techniques is also expected.