1682:
144:
Akelarre is a 128-bit block cipher with a variable key-length which must be some multiple of 64 bits. The number of rounds is variable, but four are suggested. The round function of
Akelarre is similar to IDEA in structure.
1662:
1492:
161:
168:
for Ake98. These weak keys allow a cryptanalysis faster than exhaustive search using only 71 known plaintexts, for up to 11.5 rounds of Ake98.
1330:
1265:
346:
160:(additionârotation box), the swapping of words at the end of a round, and the addition of subkeys at the beginning of each round. In 2004,
299:
296:
1092:
448:
49:
1082:
576:
1245:
1219:
1087:
983:
214:
1060:
1323:
1229:
339:
1108:
198:
1541:
1472:
1286:
1715:
1316:
376:
1657:
1612:
1415:
1172:
332:
178:
G. Ălvarez Marañón; A. FĂșster
Sabater; D. GuĂa MartĂnez; F. Montoya Vitini; A. Peinado DomĂnguez (1996).
1536:
1189:
1099:
1077:
390:
1652:
1194:
1050:
1003:
478:
75:
177:
1642:
1632:
1487:
1260:
1142:
1017:
386:
1637:
1627:
1420:
1380:
1373:
1358:
1353:
1199:
988:
359:
248:
1710:
1425:
1368:
1291:
1167:
1162:
1114:
138:
114:
1685:
1531:
1477:
1281:
1104:
963:
541:
88:
1647:
1571:
1184:
1067:
993:
676:
656:
95:
8:
1400:
1147:
1124:
443:
225:
1516:
1500:
1442:
1132:
1040:
752:
681:
651:
596:
282:
1576:
1566:
1432:
852:
551:
506:
473:
433:
381:
286:
1511:
1363:
1224:
1119:
998:
857:
737:
706:
400:
305:
274:
1071:
1055:
1044:
978:
937:
902:
832:
812:
686:
566:
561:
516:
309:
263:
Lars
Knudsen; Vincent Rijmen (April 2000). "Ciphertext-only Attack on Akelarre".
1586:
1506:
1462:
1405:
1390:
1209:
1157:
968:
953:
892:
887:
772:
521:
256:
Proceedings of SAC'97, Fourth Annual
Workshop on Selected Areas in Cryptography
244:
222:
Proceedings of SAC'97, Fourth Annual
Workshop on Selected Areas in Cryptography
210:
206:
278:
195:
Proceedings of SAC'96, Third Annual
Workshop on Selected Areas in Cryptography
1704:
1667:
1622:
1581:
1561:
1452:
1410:
1385:
1204:
1152:
1031:
1013:
802:
777:
767:
591:
581:
428:
229:
149:
130:
106:
1617:
1457:
1447:
1437:
1395:
1339:
1137:
958:
922:
787:
666:
621:
453:
405:
355:
240:
126:
179:
1596:
747:
742:
626:
265:
1556:
1526:
1521:
1482:
1179:
897:
837:
721:
716:
661:
531:
394:
188:
1546:
912:
907:
797:
711:
606:
586:
152:
of
Akelarre, its designers responded with an updated variant called
1591:
1551:
1250:
1214:
1008:
671:
546:
526:
438:
294:
J. Nakahara Jr.; D.S. de
Freitas (2004). "Cryptanalysis of Ake98".
165:
65:
917:
867:
827:
817:
762:
757:
601:
410:
205:
1467:
1255:
877:
872:
807:
792:
782:
727:
701:
696:
691:
571:
556:
239:
293:
973:
932:
882:
862:
847:
636:
616:
536:
501:
156:. This cipher differs from the original Akelarre in the new
822:
731:
646:
641:
631:
611:
483:
468:
262:
927:
842:
463:
458:
184:
134:
53:
1493:
Cryptographically secure pseudorandom number generator
302:, 5th International Conference on Cryptology in India
164:
and Daniel
Santana de Freitas found large classes of
354:
316:
33:G. Ălvarez, D. de la GuĂa, F. Montoya, A. Peinado
1702:
129:proposed in 1996, combining the basic design of
304:. Chennai: Springer-Verlag. pp. 162â174.
1324:
340:
1331:
1317:
347:
333:
258:. Carleton University. pp. 213â223.
180:"Akelarre: a New Block Cipher Algorithm"
1703:
137:. It was shown to be susceptible to a
1312:
328:
249:"Two Rights Sometimes Make a Wrong"
13:
228:. pp. 201â212. Archived from
14:
1727:
1681:
1680:
1338:
1542:Information-theoretic security
1:
171:
310:10.1007/978-3-540-30556-9_17
199:Queen's University, Kingston
7:
1658:Message authentication code
1613:Cryptographic hash function
1416:Cryptographic hash function
215:"Cryptanalysis of Akelarre"
10:
1732:
1537:Harvest now, decrypt later
1676:
1653:Post-quantum cryptography
1605:
1346:
1308:
1274:
1238:
1230:Time/memory/data tradeoff
1027:
946:
492:
419:
367:
324:
320:
279:10.1080/01611190008984238
201:, Ontario. pp. 1â14.
112:
104:
94:
84:
74:
64:
59:
45:
37:
29:
24:
1643:Quantum key distribution
1633:Authenticated encryption
1488:Random number generation
1018:Whitening transformation
1638:Public-key cryptography
1628:Symmetric-key algorithm
1421:Key derivation function
1381:Cryptographic primitive
1374:Authentication protocol
1359:Outline of cryptography
1354:History of cryptography
989:Confusion and diffusion
1426:Secure Hash Algorithms
1369:Cryptographic protocol
139:ciphertext-only attack
115:ciphertext-only attack
1532:End-to-end encryption
1478:Cryptojacking malware
1282:Initialization vector
148:After the successful
1716:Broken block ciphers
1648:Quantum cryptography
1572:Trusted timestamping
1061:3-subset MITM attack
677:Intel Cascade Cipher
657:Hasty Pudding cipher
1401:Cryptographic nonce
1100:Differential-linear
226:Carleton University
162:Jorge Nakahara, Jr.
21:
1517:Subliminal channel
1501:Pseudorandom noise
1443:Key (cryptography)
1173:Differential-fault
391:internal mechanics
19:
1698:
1697:
1694:
1693:
1577:Key-based routing
1567:Trapdoor function
1433:Digital signature
1304:
1303:
1300:
1299:
1287:Mode of operation
964:LaiâMassey scheme
235:on July 23, 2004.
120:
119:
89:LaiâMassey scheme
1723:
1684:
1683:
1512:Insecure channel
1364:Classical cipher
1333:
1326:
1319:
1310:
1309:
1158:Power-monitoring
999:Avalanche effect
707:Khufu and Khafre
360:security summary
349:
342:
335:
326:
325:
322:
321:
318:
317:
313:
290:
259:
253:
252:(PDF/PostScript)
236:
234:
219:
202:
192:
133:with ideas from
22:
18:
1731:
1730:
1726:
1725:
1724:
1722:
1721:
1720:
1701:
1700:
1699:
1690:
1672:
1601:
1342:
1337:
1296:
1270:
1239:Standardization
1234:
1163:Electromagnetic
1115:Integral/Square
1072:Piling-up lemma
1056:Biclique attack
1045:EFF DES cracker
1029:
1023:
954:Feistel network
942:
567:CIPHERUNICORN-E
562:CIPHERUNICORN-A
494:
488:
421:
415:
369:
363:
353:
251:
247:(August 1997).
232:
217:
213:(August 1997).
182:
174:
113:Susceptible to
38:First published
17:
12:
11:
5:
1729:
1719:
1718:
1713:
1696:
1695:
1692:
1691:
1689:
1688:
1677:
1674:
1673:
1671:
1670:
1665:
1663:Random numbers
1660:
1655:
1650:
1645:
1640:
1635:
1630:
1625:
1620:
1615:
1609:
1607:
1603:
1602:
1600:
1599:
1594:
1589:
1587:Garlic routing
1584:
1579:
1574:
1569:
1564:
1559:
1554:
1549:
1544:
1539:
1534:
1529:
1524:
1519:
1514:
1509:
1507:Secure channel
1504:
1498:
1497:
1496:
1485:
1480:
1475:
1470:
1465:
1463:Key stretching
1460:
1455:
1450:
1445:
1440:
1435:
1430:
1429:
1428:
1423:
1418:
1408:
1406:Cryptovirology
1403:
1398:
1393:
1391:Cryptocurrency
1388:
1383:
1378:
1377:
1376:
1366:
1361:
1356:
1350:
1348:
1344:
1343:
1336:
1335:
1328:
1321:
1313:
1306:
1305:
1302:
1301:
1298:
1297:
1295:
1294:
1289:
1284:
1278:
1276:
1272:
1271:
1269:
1268:
1263:
1258:
1253:
1248:
1242:
1240:
1236:
1235:
1233:
1232:
1227:
1222:
1217:
1212:
1207:
1202:
1197:
1192:
1187:
1182:
1177:
1176:
1175:
1170:
1165:
1160:
1155:
1145:
1140:
1135:
1130:
1122:
1117:
1112:
1105:Distinguishing
1102:
1097:
1096:
1095:
1090:
1085:
1075:
1065:
1064:
1063:
1058:
1048:
1037:
1035:
1025:
1024:
1022:
1021:
1011:
1006:
1001:
996:
991:
986:
981:
976:
971:
969:Product cipher
966:
961:
956:
950:
948:
944:
943:
941:
940:
935:
930:
925:
920:
915:
910:
905:
900:
895:
890:
885:
880:
875:
870:
865:
860:
855:
850:
845:
840:
835:
830:
825:
820:
815:
810:
805:
800:
795:
790:
785:
780:
775:
770:
765:
760:
755:
750:
745:
740:
735:
724:
719:
714:
709:
704:
699:
694:
689:
684:
679:
674:
669:
664:
659:
654:
649:
644:
639:
634:
629:
624:
619:
614:
609:
604:
599:
597:Cryptomeria/C2
594:
589:
584:
579:
574:
569:
564:
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
509:
504:
498:
496:
490:
489:
487:
486:
481:
476:
471:
466:
461:
456:
451:
446:
441:
436:
431:
425:
423:
417:
416:
414:
413:
408:
403:
398:
384:
379:
373:
371:
365:
364:
352:
351:
344:
337:
329:
315:
314:
291:
273:(2): 135â147.
260:
245:Vincent Rijmen
237:
211:Bruce Schneier
207:Niels Ferguson
203:
173:
170:
118:
117:
110:
109:
102:
101:
98:
92:
91:
86:
82:
81:
78:
72:
71:
68:
62:
61:
57:
56:
47:
43:
42:
39:
35:
34:
31:
27:
26:
15:
9:
6:
4:
3:
2:
1728:
1717:
1714:
1712:
1711:Block ciphers
1709:
1708:
1706:
1687:
1679:
1678:
1675:
1669:
1668:Steganography
1666:
1664:
1661:
1659:
1656:
1654:
1651:
1649:
1646:
1644:
1641:
1639:
1636:
1634:
1631:
1629:
1626:
1624:
1623:Stream cipher
1621:
1619:
1616:
1614:
1611:
1610:
1608:
1604:
1598:
1595:
1593:
1590:
1588:
1585:
1583:
1582:Onion routing
1580:
1578:
1575:
1573:
1570:
1568:
1565:
1563:
1562:Shared secret
1560:
1558:
1555:
1553:
1550:
1548:
1545:
1543:
1540:
1538:
1535:
1533:
1530:
1528:
1525:
1523:
1520:
1518:
1515:
1513:
1510:
1508:
1505:
1502:
1499:
1494:
1491:
1490:
1489:
1486:
1484:
1481:
1479:
1476:
1474:
1471:
1469:
1466:
1464:
1461:
1459:
1456:
1454:
1453:Key generator
1451:
1449:
1446:
1444:
1441:
1439:
1436:
1434:
1431:
1427:
1424:
1422:
1419:
1417:
1414:
1413:
1412:
1411:Hash function
1409:
1407:
1404:
1402:
1399:
1397:
1394:
1392:
1389:
1387:
1386:Cryptanalysis
1384:
1382:
1379:
1375:
1372:
1371:
1370:
1367:
1365:
1362:
1360:
1357:
1355:
1352:
1351:
1349:
1345:
1341:
1334:
1329:
1327:
1322:
1320:
1315:
1314:
1311:
1307:
1293:
1290:
1288:
1285:
1283:
1280:
1279:
1277:
1273:
1267:
1264:
1262:
1259:
1257:
1254:
1252:
1249:
1247:
1244:
1243:
1241:
1237:
1231:
1228:
1226:
1223:
1221:
1218:
1216:
1213:
1211:
1208:
1206:
1203:
1201:
1198:
1196:
1193:
1191:
1188:
1186:
1185:Interpolation
1183:
1181:
1178:
1174:
1171:
1169:
1166:
1164:
1161:
1159:
1156:
1154:
1151:
1150:
1149:
1146:
1144:
1141:
1139:
1136:
1134:
1131:
1129:
1128:
1123:
1121:
1118:
1116:
1113:
1110:
1106:
1103:
1101:
1098:
1094:
1091:
1089:
1086:
1084:
1081:
1080:
1079:
1076:
1073:
1069:
1066:
1062:
1059:
1057:
1054:
1053:
1052:
1049:
1046:
1042:
1039:
1038:
1036:
1033:
1032:cryptanalysis
1026:
1019:
1015:
1014:Key whitening
1012:
1010:
1007:
1005:
1002:
1000:
997:
995:
992:
990:
987:
985:
982:
980:
977:
975:
972:
970:
967:
965:
962:
960:
957:
955:
952:
951:
949:
945:
939:
936:
934:
931:
929:
926:
924:
921:
919:
916:
914:
911:
909:
906:
904:
901:
899:
896:
894:
891:
889:
886:
884:
881:
879:
876:
874:
871:
869:
866:
864:
861:
859:
856:
854:
851:
849:
846:
844:
841:
839:
836:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
806:
804:
803:New Data Seal
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
774:
771:
769:
766:
764:
761:
759:
756:
754:
751:
749:
746:
744:
741:
739:
736:
733:
729:
725:
723:
720:
718:
715:
713:
710:
708:
705:
703:
700:
698:
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
670:
668:
665:
663:
660:
658:
655:
653:
650:
648:
645:
643:
640:
638:
635:
633:
630:
628:
625:
623:
620:
618:
615:
613:
610:
608:
605:
603:
600:
598:
595:
593:
590:
588:
585:
583:
580:
578:
575:
573:
570:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
542:BEAR and LION
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
503:
500:
499:
497:
491:
485:
482:
480:
477:
475:
472:
470:
467:
465:
462:
460:
457:
455:
452:
450:
447:
445:
442:
440:
437:
435:
432:
430:
427:
426:
424:
418:
412:
409:
407:
404:
402:
399:
396:
392:
388:
385:
383:
380:
378:
375:
374:
372:
366:
361:
357:
356:Block ciphers
350:
345:
343:
338:
336:
331:
330:
327:
323:
319:
311:
307:
303:
301:
298:
292:
288:
284:
280:
276:
272:
268:
267:
261:
257:
250:
246:
242:
238:
231:
227:
223:
216:
212:
208:
204:
200:
196:
190:
186:
181:
176:
175:
169:
167:
163:
159:
155:
151:
150:cryptanalysis
146:
142:
140:
136:
132:
128:
124:
116:
111:
108:
107:cryptanalysis
103:
99:
97:
93:
90:
87:
83:
79:
77:
73:
69:
67:
63:
60:Cipher detail
58:
55:
51:
48:
44:
40:
36:
32:
28:
23:
1618:Block cipher
1458:Key schedule
1448:Key exchange
1438:Kleptography
1396:Cryptosystem
1340:Cryptography
1190:Partitioning
1148:Side-channel
1126:
1093:Higher-order
1078:Differential
959:Key schedule
511:
295:
270:
264:
255:
241:Lars Knudsen
230:the original
221:
194:
157:
153:
147:
143:
127:block cipher
122:
121:
105:Best public
46:Derived from
16:Block cipher
1606:Mathematics
1597:Mix network
1275:Utilization
1261:NSA Suite B
1246:AES process
1195:Rubber-hose
1133:Related-key
1041:Brute-force
420:Less common
266:Cryptologia
76:Block sizes
1705:Categories
1557:Ciphertext
1527:Decryption
1522:Encryption
1483:Ransomware
1225:Chi-square
1143:Rotational
1083:Impossible
1004:Block size
898:Spectr-H64
722:Ladder-DES
717:Kuznyechik
662:Hierocrypt
532:BassOmatic
495:algorithms
422:algorithms
395:Triple DES
370:algorithms
189:PostScript
172:References
141:in 1997.
1547:Plaintext
1200:Black-bag
1120:Boomerang
1109:Known-key
1088:Truncated
913:Threefish
908:SXAL/MBAL
798:MultiSwap
753:MacGuffin
712:KN-Cipher
652:Grand Cru
607:CS-Cipher
587:COCONUT98
297:INDOCRYPT
166:weak keys
85:Structure
66:Key sizes
30:Designers
1686:Category
1592:Kademlia
1552:Codetext
1495:(CSPRNG)
1473:Machines
1251:CRYPTREC
1215:Weak key
1168:Acoustic
1009:Key size
853:Red Pike
672:IDEA NXT
552:Chiasmus
547:CAST-256
527:BaseKing
512:Akelarre
507:Adiantum
474:Skipjack
439:CAST-128
434:Camellia
382:Blowfish
287:30403134
123:Akelarre
80:128 bits
70:128 bits
20:Akelarre
1347:General
1292:Padding
1210:Rebound
918:Treyfer
868:SAVILLE
828:PRESENT
818:NOEKEON
763:MAGENTA
758:Madryga
738:Lucifer
602:CRYPTON
411:Twofish
401:Serpent
25:General
1468:Keygen
1256:NESSIE
1205:Davies
1153:Timing
1068:Linear
1028:Attack
947:Design
938:Zodiac
903:Square
878:SHACAL
873:SC2000
833:Prince
813:Nimbus
808:NewDES
793:MULTI2
783:MISTY1
726:LOKI (
702:KHAZAD
697:KeeLoq
692:KASUMI
687:Kalyna
572:CLEFIA
557:CIKS-1
517:Anubis
368:Common
285:
158:AR-box
96:Rounds
1503:(PRN)
1138:Slide
994:Round
979:P-box
974:S-box
933:XXTEA
893:Speck
888:Simon
883:SHARK
863:SAFER
848:REDOC
773:Mercy
732:89/91
682:Iraqi
647:G-DES
637:FEA-M
617:DES-X
582:Cobra
537:BATON
522:Ascon
502:3-Way
493:Other
283:S2CID
233:(PDF)
218:(PDF)
154:Ake98
125:is a
1266:CNSA
1125:Mod
1051:MITM
823:NUSH
778:MESH
768:MARS
642:FROG
632:FEAL
612:DEAL
592:Crab
577:CMEA
484:XTEA
469:SEED
449:IDEA
444:GOST
429:ARIA
300:2004
243:and
209:and
131:IDEA
50:IDEA
41:1996
1220:Tau
1180:XSL
984:SPN
928:xmx
923:UES
858:S-1
843:RC2
788:MMB
667:ICE
622:DFC
479:TEA
464:RC6
459:RC5
454:LEA
406:SM4
387:DES
377:AES
306:doi
275:doi
185:PDF
135:RC5
54:RC5
1707::
748:M8
743:M6
730:,
728:97
627:E2
393:,
281:.
271:24
269:.
254:.
224:.
220:.
197:.
193:.
52:,
1332:e
1325:t
1318:v
1127:n
1111:)
1107:(
1074:)
1070:(
1047:)
1043:(
1034:)
1030:(
1020:)
1016:(
838:Q
734:)
397:)
389:(
362:)
358:(
348:e
341:t
334:v
312:.
308::
289:.
277::
191:)
187:/
183:(
100:4
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.