Knowledge

Akelarre (cipher)

Source 📝

1682: 144:
Akelarre is a 128-bit block cipher with a variable key-length which must be some multiple of 64 bits. The number of rounds is variable, but four are suggested. The round function of Akelarre is similar to IDEA in structure.
1662: 1492: 161: 168:
for Ake98. These weak keys allow a cryptanalysis faster than exhaustive search using only 71 known plaintexts, for up to 11.5 rounds of Ake98.
1330: 1265: 346: 160:(addition–rotation box), the swapping of words at the end of a round, and the addition of subkeys at the beginning of each round. In 2004, 299: 296: 1092: 448: 49: 1082: 576: 1245: 1219: 1087: 983: 214: 1060: 1323: 1229: 339: 1108: 198: 1541: 1472: 1286: 1715: 1316: 376: 1657: 1612: 1415: 1172: 332: 178:
G. Álvarez Marañón; A. FĂșster Sabater; D. GuĂ­a MartĂ­nez; F. Montoya Vitini; A. Peinado DomĂ­nguez (1996).
1536: 1189: 1099: 1077: 390: 1652: 1194: 1050: 1003: 478: 75: 177: 1642: 1632: 1487: 1260: 1142: 1017: 386: 1637: 1627: 1420: 1380: 1373: 1358: 1353: 1199: 988: 359: 248: 1710: 1425: 1368: 1291: 1167: 1162: 1114: 138: 114: 1685: 1531: 1477: 1281: 1104: 963: 541: 88: 1647: 1571: 1184: 1067: 993: 676: 656: 95: 8: 1400: 1147: 1124: 443: 225: 1516: 1500: 1442: 1132: 1040: 752: 681: 651: 596: 282: 1576: 1566: 1432: 852: 551: 506: 473: 433: 381: 286: 1511: 1363: 1224: 1119: 998: 857: 737: 706: 400: 305: 274: 1071: 1055: 1044: 978: 937: 902: 832: 812: 686: 566: 561: 516: 309: 263:
Lars Knudsen; Vincent Rijmen (April 2000). "Ciphertext-only Attack on Akelarre".
1586: 1506: 1462: 1405: 1390: 1209: 1157: 968: 953: 892: 887: 772: 521: 256:
Proceedings of SAC'97, Fourth Annual Workshop on Selected Areas in Cryptography
244: 222:
Proceedings of SAC'97, Fourth Annual Workshop on Selected Areas in Cryptography
210: 206: 278: 195:
Proceedings of SAC'96, Third Annual Workshop on Selected Areas in Cryptography
1704: 1667: 1622: 1581: 1561: 1452: 1410: 1385: 1204: 1152: 1031: 1013: 802: 777: 767: 591: 581: 428: 229: 149: 130: 106: 1617: 1457: 1447: 1437: 1395: 1339: 1137: 958: 922: 787: 666: 621: 453: 405: 355: 240: 126: 179: 1596: 747: 742: 626: 265: 1556: 1526: 1521: 1482: 1179: 897: 837: 721: 716: 661: 531: 394: 188: 1546: 912: 907: 797: 711: 606: 586: 152:
of Akelarre, its designers responded with an updated variant called
1591: 1551: 1250: 1214: 1008: 671: 546: 526: 438: 294:
J. Nakahara Jr.; D.S. de Freitas (2004). "Cryptanalysis of Ake98".
165: 65: 917: 867: 827: 817: 762: 757: 601: 410: 205: 1467: 1255: 877: 872: 807: 792: 782: 727: 701: 696: 691: 571: 556: 239: 293: 973: 932: 882: 862: 847: 636: 616: 536: 501: 156:. This cipher differs from the original Akelarre in the new 822: 731: 646: 641: 631: 611: 483: 468: 262: 927: 842: 463: 458: 184: 134: 53: 1493:
Cryptographically secure pseudorandom number generator
302:, 5th International Conference on Cryptology in India 164:
and Daniel Santana de Freitas found large classes of
354: 316: 33:G. Álvarez, D. de la GuĂ­a, F. Montoya, A. Peinado 1702: 129:proposed in 1996, combining the basic design of 304:. Chennai: Springer-Verlag. pp. 162–174. 1324: 340: 1331: 1317: 347: 333: 258:. Carleton University. pp. 213–223. 180:"Akelarre: a New Block Cipher Algorithm" 1703: 137:. It was shown to be susceptible to a 1312: 328: 249:"Two Rights Sometimes Make a Wrong" 13: 228:. pp. 201–212. Archived from 14: 1727: 1681: 1680: 1338: 1542:Information-theoretic security 1: 171: 310:10.1007/978-3-540-30556-9_17 199:Queen's University, Kingston 7: 1658:Message authentication code 1613:Cryptographic hash function 1416:Cryptographic hash function 215:"Cryptanalysis of Akelarre" 10: 1732: 1537:Harvest now, decrypt later 1676: 1653:Post-quantum cryptography 1605: 1346: 1308: 1274: 1238: 1230:Time/memory/data tradeoff 1027: 946: 492: 419: 367: 324: 320: 279:10.1080/01611190008984238 201:, Ontario. pp. 1–14. 112: 104: 94: 84: 74: 64: 59: 45: 37: 29: 24: 1643:Quantum key distribution 1633:Authenticated encryption 1488:Random number generation 1018:Whitening transformation 1638:Public-key cryptography 1628:Symmetric-key algorithm 1421:Key derivation function 1381:Cryptographic primitive 1374:Authentication protocol 1359:Outline of cryptography 1354:History of cryptography 989:Confusion and diffusion 1426:Secure Hash Algorithms 1369:Cryptographic protocol 139:ciphertext-only attack 115:ciphertext-only attack 1532:End-to-end encryption 1478:Cryptojacking malware 1282:Initialization vector 148:After the successful 1716:Broken block ciphers 1648:Quantum cryptography 1572:Trusted timestamping 1061:3-subset MITM attack 677:Intel Cascade Cipher 657:Hasty Pudding cipher 1401:Cryptographic nonce 1100:Differential-linear 226:Carleton University 162:Jorge Nakahara, Jr. 21: 1517:Subliminal channel 1501:Pseudorandom noise 1443:Key (cryptography) 1173:Differential-fault 391:internal mechanics 19: 1698: 1697: 1694: 1693: 1577:Key-based routing 1567:Trapdoor function 1433:Digital signature 1304: 1303: 1300: 1299: 1287:Mode of operation 964:Lai–Massey scheme 235:on July 23, 2004. 120: 119: 89:Lai–Massey scheme 1723: 1684: 1683: 1512:Insecure channel 1364:Classical cipher 1333: 1326: 1319: 1310: 1309: 1158:Power-monitoring 999:Avalanche effect 707:Khufu and Khafre 360:security summary 349: 342: 335: 326: 325: 322: 321: 318: 317: 313: 290: 259: 253: 252:(PDF/PostScript) 236: 234: 219: 202: 192: 133:with ideas from 22: 18: 1731: 1730: 1726: 1725: 1724: 1722: 1721: 1720: 1701: 1700: 1699: 1690: 1672: 1601: 1342: 1337: 1296: 1270: 1239:Standardization 1234: 1163:Electromagnetic 1115:Integral/Square 1072:Piling-up lemma 1056:Biclique attack 1045:EFF DES cracker 1029: 1023: 954:Feistel network 942: 567:CIPHERUNICORN-E 562:CIPHERUNICORN-A 494: 488: 421: 415: 369: 363: 353: 251: 247:(August 1997). 232: 217: 213:(August 1997). 182: 174: 113:Susceptible to 38:First published 17: 12: 11: 5: 1729: 1719: 1718: 1713: 1696: 1695: 1692: 1691: 1689: 1688: 1677: 1674: 1673: 1671: 1670: 1665: 1663:Random numbers 1660: 1655: 1650: 1645: 1640: 1635: 1630: 1625: 1620: 1615: 1609: 1607: 1603: 1602: 1600: 1599: 1594: 1589: 1587:Garlic routing 1584: 1579: 1574: 1569: 1564: 1559: 1554: 1549: 1544: 1539: 1534: 1529: 1524: 1519: 1514: 1509: 1507:Secure channel 1504: 1498: 1497: 1496: 1485: 1480: 1475: 1470: 1465: 1463:Key stretching 1460: 1455: 1450: 1445: 1440: 1435: 1430: 1429: 1428: 1423: 1418: 1408: 1406:Cryptovirology 1403: 1398: 1393: 1391:Cryptocurrency 1388: 1383: 1378: 1377: 1376: 1366: 1361: 1356: 1350: 1348: 1344: 1343: 1336: 1335: 1328: 1321: 1313: 1306: 1305: 1302: 1301: 1298: 1297: 1295: 1294: 1289: 1284: 1278: 1276: 1272: 1271: 1269: 1268: 1263: 1258: 1253: 1248: 1242: 1240: 1236: 1235: 1233: 1232: 1227: 1222: 1217: 1212: 1207: 1202: 1197: 1192: 1187: 1182: 1177: 1176: 1175: 1170: 1165: 1160: 1155: 1145: 1140: 1135: 1130: 1122: 1117: 1112: 1105:Distinguishing 1102: 1097: 1096: 1095: 1090: 1085: 1075: 1065: 1064: 1063: 1058: 1048: 1037: 1035: 1025: 1024: 1022: 1021: 1011: 1006: 1001: 996: 991: 986: 981: 976: 971: 969:Product cipher 966: 961: 956: 950: 948: 944: 943: 941: 940: 935: 930: 925: 920: 915: 910: 905: 900: 895: 890: 885: 880: 875: 870: 865: 860: 855: 850: 845: 840: 835: 830: 825: 820: 815: 810: 805: 800: 795: 790: 785: 780: 775: 770: 765: 760: 755: 750: 745: 740: 735: 724: 719: 714: 709: 704: 699: 694: 689: 684: 679: 674: 669: 664: 659: 654: 649: 644: 639: 634: 629: 624: 619: 614: 609: 604: 599: 597:Cryptomeria/C2 594: 589: 584: 579: 574: 569: 564: 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 509: 504: 498: 496: 490: 489: 487: 486: 481: 476: 471: 466: 461: 456: 451: 446: 441: 436: 431: 425: 423: 417: 416: 414: 413: 408: 403: 398: 384: 379: 373: 371: 365: 364: 352: 351: 344: 337: 329: 315: 314: 291: 273:(2): 135–147. 260: 245:Vincent Rijmen 237: 211:Bruce Schneier 207:Niels Ferguson 203: 173: 170: 118: 117: 110: 109: 102: 101: 98: 92: 91: 86: 82: 81: 78: 72: 71: 68: 62: 61: 57: 56: 47: 43: 42: 39: 35: 34: 31: 27: 26: 15: 9: 6: 4: 3: 2: 1728: 1717: 1714: 1712: 1711:Block ciphers 1709: 1708: 1706: 1687: 1679: 1678: 1675: 1669: 1668:Steganography 1666: 1664: 1661: 1659: 1656: 1654: 1651: 1649: 1646: 1644: 1641: 1639: 1636: 1634: 1631: 1629: 1626: 1624: 1623:Stream cipher 1621: 1619: 1616: 1614: 1611: 1610: 1608: 1604: 1598: 1595: 1593: 1590: 1588: 1585: 1583: 1582:Onion routing 1580: 1578: 1575: 1573: 1570: 1568: 1565: 1563: 1562:Shared secret 1560: 1558: 1555: 1553: 1550: 1548: 1545: 1543: 1540: 1538: 1535: 1533: 1530: 1528: 1525: 1523: 1520: 1518: 1515: 1513: 1510: 1508: 1505: 1502: 1499: 1494: 1491: 1490: 1489: 1486: 1484: 1481: 1479: 1476: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1456: 1454: 1453:Key generator 1451: 1449: 1446: 1444: 1441: 1439: 1436: 1434: 1431: 1427: 1424: 1422: 1419: 1417: 1414: 1413: 1412: 1411:Hash function 1409: 1407: 1404: 1402: 1399: 1397: 1394: 1392: 1389: 1387: 1386:Cryptanalysis 1384: 1382: 1379: 1375: 1372: 1371: 1370: 1367: 1365: 1362: 1360: 1357: 1355: 1352: 1351: 1349: 1345: 1341: 1334: 1329: 1327: 1322: 1320: 1315: 1314: 1311: 1307: 1293: 1290: 1288: 1285: 1283: 1280: 1279: 1277: 1273: 1267: 1264: 1262: 1259: 1257: 1254: 1252: 1249: 1247: 1244: 1243: 1241: 1237: 1231: 1228: 1226: 1223: 1221: 1218: 1216: 1213: 1211: 1208: 1206: 1203: 1201: 1198: 1196: 1193: 1191: 1188: 1186: 1185:Interpolation 1183: 1181: 1178: 1174: 1171: 1169: 1166: 1164: 1161: 1159: 1156: 1154: 1151: 1150: 1149: 1146: 1144: 1141: 1139: 1136: 1134: 1131: 1129: 1128: 1123: 1121: 1118: 1116: 1113: 1110: 1106: 1103: 1101: 1098: 1094: 1091: 1089: 1086: 1084: 1081: 1080: 1079: 1076: 1073: 1069: 1066: 1062: 1059: 1057: 1054: 1053: 1052: 1049: 1046: 1042: 1039: 1038: 1036: 1033: 1032:cryptanalysis 1026: 1019: 1015: 1014:Key whitening 1012: 1010: 1007: 1005: 1002: 1000: 997: 995: 992: 990: 987: 985: 982: 980: 977: 975: 972: 970: 967: 965: 962: 960: 957: 955: 952: 951: 949: 945: 939: 936: 934: 931: 929: 926: 924: 921: 919: 916: 914: 911: 909: 906: 904: 901: 899: 896: 894: 891: 889: 886: 884: 881: 879: 876: 874: 871: 869: 866: 864: 861: 859: 856: 854: 851: 849: 846: 844: 841: 839: 836: 834: 831: 829: 826: 824: 821: 819: 816: 814: 811: 809: 806: 804: 803:New Data Seal 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 764: 761: 759: 756: 754: 751: 749: 746: 744: 741: 739: 736: 733: 729: 725: 723: 720: 718: 715: 713: 710: 708: 705: 703: 700: 698: 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 670: 668: 665: 663: 660: 658: 655: 653: 650: 648: 645: 643: 640: 638: 635: 633: 630: 628: 625: 623: 620: 618: 615: 613: 610: 608: 605: 603: 600: 598: 595: 593: 590: 588: 585: 583: 580: 578: 575: 573: 570: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 542:BEAR and LION 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 503: 500: 499: 497: 491: 485: 482: 480: 477: 475: 472: 470: 467: 465: 462: 460: 457: 455: 452: 450: 447: 445: 442: 440: 437: 435: 432: 430: 427: 426: 424: 418: 412: 409: 407: 404: 402: 399: 396: 392: 388: 385: 383: 380: 378: 375: 374: 372: 366: 361: 357: 356:Block ciphers 350: 345: 343: 338: 336: 331: 330: 327: 323: 319: 311: 307: 303: 301: 298: 292: 288: 284: 280: 276: 272: 268: 267: 261: 257: 250: 246: 242: 238: 231: 227: 223: 216: 212: 208: 204: 200: 196: 190: 186: 181: 176: 175: 169: 167: 163: 159: 155: 151: 150:cryptanalysis 146: 142: 140: 136: 132: 128: 124: 116: 111: 108: 107:cryptanalysis 103: 99: 97: 93: 90: 87: 83: 79: 77: 73: 69: 67: 63: 60:Cipher detail 58: 55: 51: 48: 44: 40: 36: 32: 28: 23: 1618:Block cipher 1458:Key schedule 1448:Key exchange 1438:Kleptography 1396:Cryptosystem 1340:Cryptography 1190:Partitioning 1148:Side-channel 1126: 1093:Higher-order 1078:Differential 959:Key schedule 511: 295: 270: 264: 255: 241:Lars Knudsen 230:the original 221: 194: 157: 153: 147: 143: 127:block cipher 122: 121: 105:Best public 46:Derived from 16:Block cipher 1606:Mathematics 1597:Mix network 1275:Utilization 1261:NSA Suite B 1246:AES process 1195:Rubber-hose 1133:Related-key 1041:Brute-force 420:Less common 266:Cryptologia 76:Block sizes 1705:Categories 1557:Ciphertext 1527:Decryption 1522:Encryption 1483:Ransomware 1225:Chi-square 1143:Rotational 1083:Impossible 1004:Block size 898:Spectr-H64 722:Ladder-DES 717:Kuznyechik 662:Hierocrypt 532:BassOmatic 495:algorithms 422:algorithms 395:Triple DES 370:algorithms 189:PostScript 172:References 141:in 1997. 1547:Plaintext 1200:Black-bag 1120:Boomerang 1109:Known-key 1088:Truncated 913:Threefish 908:SXAL/MBAL 798:MultiSwap 753:MacGuffin 712:KN-Cipher 652:Grand Cru 607:CS-Cipher 587:COCONUT98 297:INDOCRYPT 166:weak keys 85:Structure 66:Key sizes 30:Designers 1686:Category 1592:Kademlia 1552:Codetext 1495:(CSPRNG) 1473:Machines 1251:CRYPTREC 1215:Weak key 1168:Acoustic 1009:Key size 853:Red Pike 672:IDEA NXT 552:Chiasmus 547:CAST-256 527:BaseKing 512:Akelarre 507:Adiantum 474:Skipjack 439:CAST-128 434:Camellia 382:Blowfish 287:30403134 123:Akelarre 80:128 bits 70:128 bits 20:Akelarre 1347:General 1292:Padding 1210:Rebound 918:Treyfer 868:SAVILLE 828:PRESENT 818:NOEKEON 763:MAGENTA 758:Madryga 738:Lucifer 602:CRYPTON 411:Twofish 401:Serpent 25:General 1468:Keygen 1256:NESSIE 1205:Davies 1153:Timing 1068:Linear 1028:Attack 947:Design 938:Zodiac 903:Square 878:SHACAL 873:SC2000 833:Prince 813:Nimbus 808:NewDES 793:MULTI2 783:MISTY1 726:LOKI ( 702:KHAZAD 697:KeeLoq 692:KASUMI 687:Kalyna 572:CLEFIA 557:CIKS-1 517:Anubis 368:Common 285:  158:AR-box 96:Rounds 1503:(PRN) 1138:Slide 994:Round 979:P-box 974:S-box 933:XXTEA 893:Speck 888:Simon 883:SHARK 863:SAFER 848:REDOC 773:Mercy 732:89/91 682:Iraqi 647:G-DES 637:FEA-M 617:DES-X 582:Cobra 537:BATON 522:Ascon 502:3-Way 493:Other 283:S2CID 233:(PDF) 218:(PDF) 154:Ake98 125:is a 1266:CNSA 1125:Mod 1051:MITM 823:NUSH 778:MESH 768:MARS 642:FROG 632:FEAL 612:DEAL 592:Crab 577:CMEA 484:XTEA 469:SEED 449:IDEA 444:GOST 429:ARIA 300:2004 243:and 209:and 131:IDEA 50:IDEA 41:1996 1220:Tau 1180:XSL 984:SPN 928:xmx 923:UES 858:S-1 843:RC2 788:MMB 667:ICE 622:DFC 479:TEA 464:RC6 459:RC5 454:LEA 406:SM4 387:DES 377:AES 306:doi 275:doi 185:PDF 135:RC5 54:RC5 1707:: 748:M8 743:M6 730:, 728:97 627:E2 393:, 281:. 271:24 269:. 254:. 224:. 220:. 197:. 193:. 52:, 1332:e 1325:t 1318:v 1127:n 1111:) 1107:( 1074:) 1070:( 1047:) 1043:( 1034:) 1030:( 1020:) 1016:( 838:Q 734:) 397:) 389:( 362:) 358:( 348:e 341:t 334:v 312:. 308:: 289:. 277:: 191:) 187:/ 183:( 100:4

Index

IDEA
RC5
Key sizes
Block sizes
Lai–Massey scheme
Rounds
cryptanalysis
ciphertext-only attack
block cipher
IDEA
RC5
ciphertext-only attack
cryptanalysis
Jorge Nakahara, Jr.
weak keys
"Akelarre: a New Block Cipher Algorithm"
PDF
PostScript
Queen's University, Kingston
Niels Ferguson
Bruce Schneier
"Cryptanalysis of Akelarre"
Carleton University
the original
Lars Knudsen
Vincent Rijmen
"Two Rights Sometimes Make a Wrong"
Cryptologia
doi
10.1080/01611190008984238

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑