Knowledge

BaseKing

Source đź“ť

1656: 171:
In Daemen's doctoral dissertation he presented an extensive theory of block cipher design, as well as a rather general cipher algorithm composed of a number of invertible transformations that may be chosen with considerable freedom. He discussed the security of this general scheme against known
1636: 1466: 176:, and gave two specific examples of ciphers consisting of particular choices for the variable parameters. These ciphers are 3-Way and BaseKing. 198: 1304: 1239: 320: 1066: 422: 1056: 550: 199:"Cipher and Hash Function Design: Strategies based on linear and differential cryptanalysis (Ph.D. dissertation), chapter 7" 1219: 1193: 1061: 957: 165: 96: 1034: 1297: 1203: 313: 1082: 187:, along with some techniques to increase the resistance of a given implementation of BaseKing to such an attack. 1515: 1446: 1260: 202: 1689: 1290: 350: 1631: 1586: 1389: 1146: 306: 184: 160:
of 192 bits–twice as long as 3-Way, and notably not a power of two as with most block ciphers. The
1510: 1163: 1073: 1051: 364: 1626: 1168: 1024: 977: 452: 157: 83: 245: 206: 1616: 1606: 1461: 1234: 1116: 991: 360: 267: 1611: 1601: 1394: 1354: 1347: 1332: 1327: 1173: 962: 333: 1684: 1399: 1342: 1265: 1141: 1136: 1088: 183:
as 3-Way. Daemen, Peeters, and Van Assche have also demonstrated potential vulnerabilities to
1659: 1505: 1451: 1255: 1078: 937: 515: 232: 1621: 1545: 1158: 1041: 967: 650: 630: 103: 8: 1374: 1121: 1098: 417: 1490: 1474: 1416: 1106: 1014: 726: 655: 625: 570: 180: 121: 1550: 1540: 1406: 826: 525: 485: 480: 447: 407: 355: 1485: 1337: 1198: 1093: 972: 831: 711: 680: 374: 1045: 1029: 1018: 952: 911: 876: 806: 786: 660: 540: 535: 490: 275: 1560: 1480: 1436: 1379: 1364: 1183: 1131: 942: 927: 866: 861: 746: 495: 125: 1678: 1641: 1596: 1555: 1535: 1426: 1384: 1359: 1178: 1126: 1005: 987: 776: 751: 741: 565: 555: 402: 271: 173: 114: 1591: 1431: 1421: 1411: 1369: 1313: 1111: 932: 896: 761: 640: 595: 427: 379: 329: 252: 142: 134: 254: 1570: 721: 716: 600: 146: 33: 1530: 1500: 1495: 1456: 1153: 871: 811: 695: 690: 635: 505: 368: 214: 161: 1520: 886: 881: 771: 685: 580: 560: 1565: 1525: 1224: 1188: 982: 645: 520: 412: 73: 891: 841: 801: 791: 736: 731: 575: 384: 51: 153:, as the two are variants of the same general cipher technique. 1441: 1229: 851: 846: 781: 766: 756: 701: 675: 670: 665: 545: 530: 947: 906: 856: 836: 821: 610: 590: 510: 475: 150: 61: 796: 705: 620: 615: 605: 585: 457: 442: 211: 901: 816: 437: 432: 261: 253:
Joan Daemen; Michael Peeters; Gilles Van Assche (2000).
1467:
Cryptographically secure pseudorandom number generator
328: 290: 1676: 1298: 314: 179:BaseKing is susceptible to the same kind of 256:Bitslice Ciphers and Power Analysis Attacks 196: 1305: 1291: 321: 307: 164:is also 192 bits. BaseKing is an 11-round 1677: 1286: 302: 13: 14: 1701: 1655: 1654: 1312: 266:. 7th International Workshop on 166:substitution–permutation network 149:. It is very closely related to 97:Substitution–permutation network 1516:Information-theoretic security 203:Katholieke Universiteit Leuven 1: 190: 7: 1632:Message authentication code 1587:Cryptographic hash function 1390:Cryptographic hash function 185:differential power analysis 10: 1706: 1511:Harvest now, decrypt later 1650: 1627:Post-quantum cryptography 1579: 1320: 1282: 1248: 1212: 1204:Time/memory/data tradeoff 1001: 920: 466: 393: 341: 298: 294: 120: 112: 102: 92: 82: 72: 67: 57: 47: 39: 29: 24: 1617:Quantum key distribution 1607:Authenticated encryption 1462:Random number generation 992:Whitening transformation 268:Fast Software Encryption 1612:Public-key cryptography 1602:Symmetric-key algorithm 1395:Key derivation function 1355:Cryptographic primitive 1348:Authentication protocol 1333:Outline of cryptography 1328:History of cryptography 963:Confusion and diffusion 1400:Secure Hash Algorithms 1343:Cryptographic protocol 240:Cite journal requires 1506:End-to-end encryption 1452:Cryptojacking malware 1256:Initialization vector 174:cryptanalytic attacks 1690:Broken block ciphers 1622:Quantum cryptography 1546:Trusted timestamping 1035:3-subset MITM attack 651:Intel Cascade Cipher 631:Hasty Pudding cipher 197:Joan Daemen (1994). 145:designed in 1994 by 1375:Cryptographic nonce 1074:Differential-linear 219:on 11 December 2006 21: 1491:Subliminal channel 1475:Pseudorandom noise 1417:Key (cryptography) 1147:Differential-fault 365:internal mechanics 278:. pp. 134–149 181:related-key attack 122:related-key attack 19: 1672: 1671: 1668: 1667: 1551:Key-based routing 1541:Trapdoor function 1407:Digital signature 1278: 1277: 1274: 1273: 1261:Mode of operation 938:Lai–Massey scheme 131: 130: 1697: 1658: 1657: 1486:Insecure channel 1338:Classical cipher 1307: 1300: 1293: 1284: 1283: 1132:Power-monitoring 973:Avalanche effect 681:Khufu and Khafre 334:security summary 323: 316: 309: 300: 299: 296: 295: 292: 291: 287: 285: 283: 265: 249: 243: 238: 236: 228: 226: 224: 218: 205:. Archived from 22: 18: 1705: 1704: 1700: 1699: 1698: 1696: 1695: 1694: 1675: 1674: 1673: 1664: 1646: 1575: 1316: 1311: 1270: 1244: 1213:Standardization 1208: 1137:Electromagnetic 1089:Integral/Square 1046:Piling-up lemma 1030:Biclique attack 1019:EFF DES cracker 1003: 997: 928:Feistel network 916: 541:CIPHERUNICORN-E 536:CIPHERUNICORN-A 468: 462: 395: 389: 343: 337: 327: 281: 279: 276:Springer-Verlag 259: 241: 239: 230: 229: 222: 220: 209: 193: 156:BaseKing has a 58:Related to 40:First published 17: 12: 11: 5: 1703: 1693: 1692: 1687: 1670: 1669: 1666: 1665: 1663: 1662: 1651: 1648: 1647: 1645: 1644: 1639: 1637:Random numbers 1634: 1629: 1624: 1619: 1614: 1609: 1604: 1599: 1594: 1589: 1583: 1581: 1577: 1576: 1574: 1573: 1568: 1563: 1561:Garlic routing 1558: 1553: 1548: 1543: 1538: 1533: 1528: 1523: 1518: 1513: 1508: 1503: 1498: 1493: 1488: 1483: 1481:Secure channel 1478: 1472: 1471: 1470: 1459: 1454: 1449: 1444: 1439: 1437:Key stretching 1434: 1429: 1424: 1419: 1414: 1409: 1404: 1403: 1402: 1397: 1392: 1382: 1380:Cryptovirology 1377: 1372: 1367: 1365:Cryptocurrency 1362: 1357: 1352: 1351: 1350: 1340: 1335: 1330: 1324: 1322: 1318: 1317: 1310: 1309: 1302: 1295: 1287: 1280: 1279: 1276: 1275: 1272: 1271: 1269: 1268: 1263: 1258: 1252: 1250: 1246: 1245: 1243: 1242: 1237: 1232: 1227: 1222: 1216: 1214: 1210: 1209: 1207: 1206: 1201: 1196: 1191: 1186: 1181: 1176: 1171: 1166: 1161: 1156: 1151: 1150: 1149: 1144: 1139: 1134: 1129: 1119: 1114: 1109: 1104: 1096: 1091: 1086: 1079:Distinguishing 1076: 1071: 1070: 1069: 1064: 1059: 1049: 1039: 1038: 1037: 1032: 1022: 1011: 1009: 999: 998: 996: 995: 985: 980: 975: 970: 965: 960: 955: 950: 945: 943:Product cipher 940: 935: 930: 924: 922: 918: 917: 915: 914: 909: 904: 899: 894: 889: 884: 879: 874: 869: 864: 859: 854: 849: 844: 839: 834: 829: 824: 819: 814: 809: 804: 799: 794: 789: 784: 779: 774: 769: 764: 759: 754: 749: 744: 739: 734: 729: 724: 719: 714: 709: 698: 693: 688: 683: 678: 673: 668: 663: 658: 653: 648: 643: 638: 633: 628: 623: 618: 613: 608: 603: 598: 593: 588: 583: 578: 573: 571:Cryptomeria/C2 568: 563: 558: 553: 548: 543: 538: 533: 528: 523: 518: 513: 508: 503: 498: 493: 488: 483: 478: 472: 470: 464: 463: 461: 460: 455: 450: 445: 440: 435: 430: 425: 420: 415: 410: 405: 399: 397: 391: 390: 388: 387: 382: 377: 372: 358: 353: 347: 345: 339: 338: 326: 325: 318: 311: 303: 289: 288: 250: 242:|journal= 192: 189: 129: 128: 126:power analysis 118: 117: 110: 109: 106: 100: 99: 94: 90: 89: 86: 80: 79: 76: 70: 69: 65: 64: 59: 55: 54: 49: 45: 44: 41: 37: 36: 31: 27: 26: 15: 9: 6: 4: 3: 2: 1702: 1691: 1688: 1686: 1685:Block ciphers 1683: 1682: 1680: 1661: 1653: 1652: 1649: 1643: 1642:Steganography 1640: 1638: 1635: 1633: 1630: 1628: 1625: 1623: 1620: 1618: 1615: 1613: 1610: 1608: 1605: 1603: 1600: 1598: 1597:Stream cipher 1595: 1593: 1590: 1588: 1585: 1584: 1582: 1578: 1572: 1569: 1567: 1564: 1562: 1559: 1557: 1556:Onion routing 1554: 1552: 1549: 1547: 1544: 1542: 1539: 1537: 1536:Shared secret 1534: 1532: 1529: 1527: 1524: 1522: 1519: 1517: 1514: 1512: 1509: 1507: 1504: 1502: 1499: 1497: 1494: 1492: 1489: 1487: 1484: 1482: 1479: 1476: 1473: 1468: 1465: 1464: 1463: 1460: 1458: 1455: 1453: 1450: 1448: 1445: 1443: 1440: 1438: 1435: 1433: 1430: 1428: 1427:Key generator 1425: 1423: 1420: 1418: 1415: 1413: 1410: 1408: 1405: 1401: 1398: 1396: 1393: 1391: 1388: 1387: 1386: 1385:Hash function 1383: 1381: 1378: 1376: 1373: 1371: 1368: 1366: 1363: 1361: 1360:Cryptanalysis 1358: 1356: 1353: 1349: 1346: 1345: 1344: 1341: 1339: 1336: 1334: 1331: 1329: 1326: 1325: 1323: 1319: 1315: 1308: 1303: 1301: 1296: 1294: 1289: 1288: 1285: 1281: 1267: 1264: 1262: 1259: 1257: 1254: 1253: 1251: 1247: 1241: 1238: 1236: 1233: 1231: 1228: 1226: 1223: 1221: 1218: 1217: 1215: 1211: 1205: 1202: 1200: 1197: 1195: 1192: 1190: 1187: 1185: 1182: 1180: 1177: 1175: 1172: 1170: 1167: 1165: 1162: 1160: 1159:Interpolation 1157: 1155: 1152: 1148: 1145: 1143: 1140: 1138: 1135: 1133: 1130: 1128: 1125: 1124: 1123: 1120: 1118: 1115: 1113: 1110: 1108: 1105: 1103: 1102: 1097: 1095: 1092: 1090: 1087: 1084: 1080: 1077: 1075: 1072: 1068: 1065: 1063: 1060: 1058: 1055: 1054: 1053: 1050: 1047: 1043: 1040: 1036: 1033: 1031: 1028: 1027: 1026: 1023: 1020: 1016: 1013: 1012: 1010: 1007: 1006:cryptanalysis 1000: 993: 989: 988:Key whitening 986: 984: 981: 979: 976: 974: 971: 969: 966: 964: 961: 959: 956: 954: 951: 949: 946: 944: 941: 939: 936: 934: 931: 929: 926: 925: 923: 919: 913: 910: 908: 905: 903: 900: 898: 895: 893: 890: 888: 885: 883: 880: 878: 875: 873: 870: 868: 865: 863: 860: 858: 855: 853: 850: 848: 845: 843: 840: 838: 835: 833: 830: 828: 825: 823: 820: 818: 815: 813: 810: 808: 805: 803: 800: 798: 795: 793: 790: 788: 785: 783: 780: 778: 777:New Data Seal 775: 773: 770: 768: 765: 763: 760: 758: 755: 753: 750: 748: 745: 743: 740: 738: 735: 733: 730: 728: 725: 723: 720: 718: 715: 713: 710: 707: 703: 699: 697: 694: 692: 689: 687: 684: 682: 679: 677: 674: 672: 669: 667: 664: 662: 659: 657: 654: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 627: 624: 622: 619: 617: 614: 612: 609: 607: 604: 602: 599: 597: 594: 592: 589: 587: 584: 582: 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 534: 532: 529: 527: 524: 522: 519: 517: 516:BEAR and LION 514: 512: 509: 507: 504: 502: 499: 497: 494: 492: 489: 487: 484: 482: 479: 477: 474: 473: 471: 465: 459: 456: 454: 451: 449: 446: 444: 441: 439: 436: 434: 431: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 400: 398: 392: 386: 383: 381: 378: 376: 373: 370: 366: 362: 359: 357: 354: 352: 349: 348: 346: 340: 335: 331: 330:Block ciphers 324: 319: 317: 312: 310: 305: 304: 301: 297: 293: 277: 273: 272:New York City 269: 263: 258: 257: 251: 247: 234: 216: 213: 208: 204: 200: 195: 194: 188: 186: 182: 177: 175: 169: 167: 163: 159: 154: 152: 148: 144: 140: 136: 127: 123: 119: 116: 115:cryptanalysis 111: 107: 105: 101: 98: 95: 91: 87: 85: 81: 77: 75: 71: 68:Cipher detail 66: 63: 60: 56: 53: 50: 46: 42: 38: 35: 32: 28: 23: 1592:Block cipher 1432:Key schedule 1422:Key exchange 1412:Kleptography 1370:Cryptosystem 1314:Cryptography 1164:Partitioning 1122:Side-channel 1100: 1067:Higher-order 1052:Differential 933:Key schedule 500: 280:. Retrieved 270:(FSE 2000). 264:/PostScript) 255: 233:cite journal 221:. Retrieved 207:the original 178: 170: 155: 143:block cipher 138: 135:cryptography 132: 113:Best public 16:Block cipher 1580:Mathematics 1571:Mix network 1249:Utilization 1235:NSA Suite B 1220:AES process 1169:Rubber-hose 1107:Related-key 1015:Brute-force 394:Less common 282:16 February 223:16 February 147:Joan Daemen 84:Block sizes 34:Joan Daemen 1679:Categories 1531:Ciphertext 1501:Decryption 1496:Encryption 1457:Ransomware 1199:Chi-square 1117:Rotational 1057:Impossible 978:Block size 872:Spectr-H64 696:Ladder-DES 691:Kuznyechik 636:Hierocrypt 506:BassOmatic 469:algorithms 396:algorithms 369:Triple DES 344:algorithms 215:PostScript 191:References 162:key length 158:block size 48:Successors 1521:Plaintext 1174:Black-bag 1094:Boomerang 1083:Known-key 1062:Truncated 887:Threefish 882:SXAL/MBAL 772:MultiSwap 727:MacGuffin 686:KN-Cipher 626:Grand Cru 581:CS-Cipher 561:COCONUT98 93:Structure 74:Key sizes 30:Designers 1660:Category 1566:Kademlia 1526:Codetext 1469:(CSPRNG) 1447:Machines 1225:CRYPTREC 1189:Weak key 1142:Acoustic 983:Key size 827:Red Pike 646:IDEA NXT 526:Chiasmus 521:CAST-256 501:BaseKing 486:Akelarre 481:Adiantum 448:Skipjack 413:CAST-128 408:Camellia 356:Blowfish 139:BaseKing 88:192 bits 78:192 bits 20:BaseKing 1321:General 1266:Padding 1184:Rebound 892:Treyfer 842:SAVILLE 802:PRESENT 792:NOEKEON 737:MAGENTA 732:Madryga 712:Lucifer 576:CRYPTON 385:Twofish 375:Serpent 212:gzipped 52:NOEKEON 25:General 1442:Keygen 1230:NESSIE 1179:Davies 1127:Timing 1042:Linear 1002:Attack 921:Design 912:Zodiac 877:Square 852:SHACAL 847:SC2000 807:Prince 787:Nimbus 782:NewDES 767:MULTI2 757:MISTY1 700:LOKI ( 676:KHAZAD 671:KeeLoq 666:KASUMI 661:Kalyna 546:CLEFIA 531:CIKS-1 491:Anubis 342:Common 104:Rounds 1477:(PRN) 1112:Slide 968:Round 953:P-box 948:S-box 907:XXTEA 867:Speck 862:Simon 857:SHARK 837:SAFER 822:REDOC 747:Mercy 706:89/91 656:Iraqi 621:G-DES 611:FEA-M 591:DES-X 556:Cobra 511:BATON 496:Ascon 476:3-Way 467:Other 151:3-Way 141:is a 62:3-Way 1240:CNSA 1099:Mod 1025:MITM 797:NUSH 752:MESH 742:MARS 616:FROG 606:FEAL 586:DEAL 566:Crab 551:CMEA 458:XTEA 443:SEED 423:IDEA 418:GOST 403:ARIA 284:2007 246:help 225:2007 43:1994 1194:Tau 1154:XSL 958:SPN 902:xmx 897:UES 832:S-1 817:RC2 762:MMB 641:ICE 596:DFC 453:TEA 438:RC6 433:RC5 428:LEA 380:SM4 361:DES 351:AES 262:PDF 133:In 1681:: 722:M8 717:M6 704:, 702:97 601:E2 367:, 274:: 237:: 235:}} 231:{{ 201:. 168:. 137:, 124:, 108:11 1306:e 1299:t 1292:v 1101:n 1085:) 1081:( 1048:) 1044:( 1021:) 1017:( 1008:) 1004:( 994:) 990:( 812:Q 708:) 371:) 363:( 336:) 332:( 322:e 315:t 308:v 286:. 260:( 248:) 244:( 227:. 217:) 210:(

Index

Joan Daemen
NOEKEON
3-Way
Key sizes
Block sizes
Substitution–permutation network
Rounds
cryptanalysis
related-key attack
power analysis
cryptography
block cipher
Joan Daemen
3-Way
block size
key length
substitution–permutation network
cryptanalytic attacks
related-key attack
differential power analysis
"Cipher and Hash Function Design: Strategies based on linear and differential cryptanalysis (Ph.D. dissertation), chapter 7"
Katholieke Universiteit Leuven
the original
gzipped
PostScript
cite journal
help
Bitslice Ciphers and Power Analysis Attacks
PDF
Fast Software Encryption

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑