1656:
171:
In Daemen's doctoral dissertation he presented an extensive theory of block cipher design, as well as a rather general cipher algorithm composed of a number of invertible transformations that may be chosen with considerable freedom. He discussed the security of this general scheme against known
1636:
1466:
176:, and gave two specific examples of ciphers consisting of particular choices for the variable parameters. These ciphers are 3-Way and BaseKing.
198:
1304:
1239:
320:
1066:
422:
1056:
550:
199:"Cipher and Hash Function Design: Strategies based on linear and differential cryptanalysis (Ph.D. dissertation), chapter 7"
1219:
1193:
1061:
957:
165:
96:
1034:
1297:
1203:
313:
1082:
187:, along with some techniques to increase the resistance of a given implementation of BaseKing to such an attack.
1515:
1446:
1260:
202:
1689:
1290:
350:
1631:
1586:
1389:
1146:
306:
184:
160:
of 192 bits–twice as long as 3-Way, and notably not a power of two as with most block ciphers. The
1510:
1163:
1073:
1051:
364:
1626:
1168:
1024:
977:
452:
157:
83:
245:
206:
1616:
1606:
1461:
1234:
1116:
991:
360:
267:
1611:
1601:
1394:
1354:
1347:
1332:
1327:
1173:
962:
333:
1684:
1399:
1342:
1265:
1141:
1136:
1088:
183:
as 3-Way. Daemen, Peeters, and Van Assche have also demonstrated potential vulnerabilities to
1659:
1505:
1451:
1255:
1078:
937:
515:
232:
1621:
1545:
1158:
1041:
967:
650:
630:
103:
8:
1374:
1121:
1098:
417:
1490:
1474:
1416:
1106:
1014:
726:
655:
625:
570:
180:
121:
1550:
1540:
1406:
826:
525:
485:
480:
447:
407:
355:
1485:
1337:
1198:
1093:
972:
831:
711:
680:
374:
1045:
1029:
1018:
952:
911:
876:
806:
786:
660:
540:
535:
490:
275:
1560:
1480:
1436:
1379:
1364:
1183:
1131:
942:
927:
866:
861:
746:
495:
125:
1678:
1641:
1596:
1555:
1535:
1426:
1384:
1359:
1178:
1126:
1005:
987:
776:
751:
741:
565:
555:
402:
271:
173:
114:
1591:
1431:
1421:
1411:
1369:
1313:
1111:
932:
896:
761:
640:
595:
427:
379:
329:
252:
142:
134:
254:
1570:
721:
716:
600:
146:
33:
1530:
1500:
1495:
1456:
1153:
871:
811:
695:
690:
635:
505:
368:
214:
161:
1520:
886:
881:
771:
685:
580:
560:
1565:
1525:
1224:
1188:
982:
645:
520:
412:
73:
891:
841:
801:
791:
736:
731:
575:
384:
51:
153:, as the two are variants of the same general cipher technique.
1441:
1229:
851:
846:
781:
766:
756:
701:
675:
670:
665:
545:
530:
947:
906:
856:
836:
821:
610:
590:
510:
475:
150:
61:
796:
705:
620:
615:
605:
585:
457:
442:
211:
901:
816:
437:
432:
261:
253:
Joan Daemen; Michael
Peeters; Gilles Van Assche (2000).
1467:
Cryptographically secure pseudorandom number generator
328:
290:
1676:
1298:
314:
179:BaseKing is susceptible to the same kind of
256:Bitslice Ciphers and Power Analysis Attacks
196:
1305:
1291:
321:
307:
164:is also 192 bits. BaseKing is an 11-round
1677:
1286:
302:
13:
14:
1701:
1655:
1654:
1312:
266:. 7th International Workshop on
166:substitution–permutation network
149:. It is very closely related to
97:Substitution–permutation network
1516:Information-theoretic security
203:Katholieke Universiteit Leuven
1:
190:
7:
1632:Message authentication code
1587:Cryptographic hash function
1390:Cryptographic hash function
185:differential power analysis
10:
1706:
1511:Harvest now, decrypt later
1650:
1627:Post-quantum cryptography
1579:
1320:
1282:
1248:
1212:
1204:Time/memory/data tradeoff
1001:
920:
466:
393:
341:
298:
294:
120:
112:
102:
92:
82:
72:
67:
57:
47:
39:
29:
24:
1617:Quantum key distribution
1607:Authenticated encryption
1462:Random number generation
992:Whitening transformation
268:Fast Software Encryption
1612:Public-key cryptography
1602:Symmetric-key algorithm
1395:Key derivation function
1355:Cryptographic primitive
1348:Authentication protocol
1333:Outline of cryptography
1328:History of cryptography
963:Confusion and diffusion
1400:Secure Hash Algorithms
1343:Cryptographic protocol
240:Cite journal requires
1506:End-to-end encryption
1452:Cryptojacking malware
1256:Initialization vector
174:cryptanalytic attacks
1690:Broken block ciphers
1622:Quantum cryptography
1546:Trusted timestamping
1035:3-subset MITM attack
651:Intel Cascade Cipher
631:Hasty Pudding cipher
197:Joan Daemen (1994).
145:designed in 1994 by
1375:Cryptographic nonce
1074:Differential-linear
219:on 11 December 2006
21:
1491:Subliminal channel
1475:Pseudorandom noise
1417:Key (cryptography)
1147:Differential-fault
365:internal mechanics
278:. pp. 134–149
181:related-key attack
122:related-key attack
19:
1672:
1671:
1668:
1667:
1551:Key-based routing
1541:Trapdoor function
1407:Digital signature
1278:
1277:
1274:
1273:
1261:Mode of operation
938:Lai–Massey scheme
131:
130:
1697:
1658:
1657:
1486:Insecure channel
1338:Classical cipher
1307:
1300:
1293:
1284:
1283:
1132:Power-monitoring
973:Avalanche effect
681:Khufu and Khafre
334:security summary
323:
316:
309:
300:
299:
296:
295:
292:
291:
287:
285:
283:
265:
249:
243:
238:
236:
228:
226:
224:
218:
205:. Archived from
22:
18:
1705:
1704:
1700:
1699:
1698:
1696:
1695:
1694:
1675:
1674:
1673:
1664:
1646:
1575:
1316:
1311:
1270:
1244:
1213:Standardization
1208:
1137:Electromagnetic
1089:Integral/Square
1046:Piling-up lemma
1030:Biclique attack
1019:EFF DES cracker
1003:
997:
928:Feistel network
916:
541:CIPHERUNICORN-E
536:CIPHERUNICORN-A
468:
462:
395:
389:
343:
337:
327:
281:
279:
276:Springer-Verlag
259:
241:
239:
230:
229:
222:
220:
209:
193:
156:BaseKing has a
58:Related to
40:First published
17:
12:
11:
5:
1703:
1693:
1692:
1687:
1670:
1669:
1666:
1665:
1663:
1662:
1651:
1648:
1647:
1645:
1644:
1639:
1637:Random numbers
1634:
1629:
1624:
1619:
1614:
1609:
1604:
1599:
1594:
1589:
1583:
1581:
1577:
1576:
1574:
1573:
1568:
1563:
1561:Garlic routing
1558:
1553:
1548:
1543:
1538:
1533:
1528:
1523:
1518:
1513:
1508:
1503:
1498:
1493:
1488:
1483:
1481:Secure channel
1478:
1472:
1471:
1470:
1459:
1454:
1449:
1444:
1439:
1437:Key stretching
1434:
1429:
1424:
1419:
1414:
1409:
1404:
1403:
1402:
1397:
1392:
1382:
1380:Cryptovirology
1377:
1372:
1367:
1365:Cryptocurrency
1362:
1357:
1352:
1351:
1350:
1340:
1335:
1330:
1324:
1322:
1318:
1317:
1310:
1309:
1302:
1295:
1287:
1280:
1279:
1276:
1275:
1272:
1271:
1269:
1268:
1263:
1258:
1252:
1250:
1246:
1245:
1243:
1242:
1237:
1232:
1227:
1222:
1216:
1214:
1210:
1209:
1207:
1206:
1201:
1196:
1191:
1186:
1181:
1176:
1171:
1166:
1161:
1156:
1151:
1150:
1149:
1144:
1139:
1134:
1129:
1119:
1114:
1109:
1104:
1096:
1091:
1086:
1079:Distinguishing
1076:
1071:
1070:
1069:
1064:
1059:
1049:
1039:
1038:
1037:
1032:
1022:
1011:
1009:
999:
998:
996:
995:
985:
980:
975:
970:
965:
960:
955:
950:
945:
943:Product cipher
940:
935:
930:
924:
922:
918:
917:
915:
914:
909:
904:
899:
894:
889:
884:
879:
874:
869:
864:
859:
854:
849:
844:
839:
834:
829:
824:
819:
814:
809:
804:
799:
794:
789:
784:
779:
774:
769:
764:
759:
754:
749:
744:
739:
734:
729:
724:
719:
714:
709:
698:
693:
688:
683:
678:
673:
668:
663:
658:
653:
648:
643:
638:
633:
628:
623:
618:
613:
608:
603:
598:
593:
588:
583:
578:
573:
571:Cryptomeria/C2
568:
563:
558:
553:
548:
543:
538:
533:
528:
523:
518:
513:
508:
503:
498:
493:
488:
483:
478:
472:
470:
464:
463:
461:
460:
455:
450:
445:
440:
435:
430:
425:
420:
415:
410:
405:
399:
397:
391:
390:
388:
387:
382:
377:
372:
358:
353:
347:
345:
339:
338:
326:
325:
318:
311:
303:
289:
288:
250:
242:|journal=
192:
189:
129:
128:
126:power analysis
118:
117:
110:
109:
106:
100:
99:
94:
90:
89:
86:
80:
79:
76:
70:
69:
65:
64:
59:
55:
54:
49:
45:
44:
41:
37:
36:
31:
27:
26:
15:
9:
6:
4:
3:
2:
1702:
1691:
1688:
1686:
1685:Block ciphers
1683:
1682:
1680:
1661:
1653:
1652:
1649:
1643:
1642:Steganography
1640:
1638:
1635:
1633:
1630:
1628:
1625:
1623:
1620:
1618:
1615:
1613:
1610:
1608:
1605:
1603:
1600:
1598:
1597:Stream cipher
1595:
1593:
1590:
1588:
1585:
1584:
1582:
1578:
1572:
1569:
1567:
1564:
1562:
1559:
1557:
1556:Onion routing
1554:
1552:
1549:
1547:
1544:
1542:
1539:
1537:
1536:Shared secret
1534:
1532:
1529:
1527:
1524:
1522:
1519:
1517:
1514:
1512:
1509:
1507:
1504:
1502:
1499:
1497:
1494:
1492:
1489:
1487:
1484:
1482:
1479:
1476:
1473:
1468:
1465:
1464:
1463:
1460:
1458:
1455:
1453:
1450:
1448:
1445:
1443:
1440:
1438:
1435:
1433:
1430:
1428:
1427:Key generator
1425:
1423:
1420:
1418:
1415:
1413:
1410:
1408:
1405:
1401:
1398:
1396:
1393:
1391:
1388:
1387:
1386:
1385:Hash function
1383:
1381:
1378:
1376:
1373:
1371:
1368:
1366:
1363:
1361:
1360:Cryptanalysis
1358:
1356:
1353:
1349:
1346:
1345:
1344:
1341:
1339:
1336:
1334:
1331:
1329:
1326:
1325:
1323:
1319:
1315:
1308:
1303:
1301:
1296:
1294:
1289:
1288:
1285:
1281:
1267:
1264:
1262:
1259:
1257:
1254:
1253:
1251:
1247:
1241:
1238:
1236:
1233:
1231:
1228:
1226:
1223:
1221:
1218:
1217:
1215:
1211:
1205:
1202:
1200:
1197:
1195:
1192:
1190:
1187:
1185:
1182:
1180:
1177:
1175:
1172:
1170:
1167:
1165:
1162:
1160:
1159:Interpolation
1157:
1155:
1152:
1148:
1145:
1143:
1140:
1138:
1135:
1133:
1130:
1128:
1125:
1124:
1123:
1120:
1118:
1115:
1113:
1110:
1108:
1105:
1103:
1102:
1097:
1095:
1092:
1090:
1087:
1084:
1080:
1077:
1075:
1072:
1068:
1065:
1063:
1060:
1058:
1055:
1054:
1053:
1050:
1047:
1043:
1040:
1036:
1033:
1031:
1028:
1027:
1026:
1023:
1020:
1016:
1013:
1012:
1010:
1007:
1006:cryptanalysis
1000:
993:
989:
988:Key whitening
986:
984:
981:
979:
976:
974:
971:
969:
966:
964:
961:
959:
956:
954:
951:
949:
946:
944:
941:
939:
936:
934:
931:
929:
926:
925:
923:
919:
913:
910:
908:
905:
903:
900:
898:
895:
893:
890:
888:
885:
883:
880:
878:
875:
873:
870:
868:
865:
863:
860:
858:
855:
853:
850:
848:
845:
843:
840:
838:
835:
833:
830:
828:
825:
823:
820:
818:
815:
813:
810:
808:
805:
803:
800:
798:
795:
793:
790:
788:
785:
783:
780:
778:
777:New Data Seal
775:
773:
770:
768:
765:
763:
760:
758:
755:
753:
750:
748:
745:
743:
740:
738:
735:
733:
730:
728:
725:
723:
720:
718:
715:
713:
710:
707:
703:
699:
697:
694:
692:
689:
687:
684:
682:
679:
677:
674:
672:
669:
667:
664:
662:
659:
657:
654:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
627:
624:
622:
619:
617:
614:
612:
609:
607:
604:
602:
599:
597:
594:
592:
589:
587:
584:
582:
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
534:
532:
529:
527:
524:
522:
519:
517:
516:BEAR and LION
514:
512:
509:
507:
504:
502:
499:
497:
494:
492:
489:
487:
484:
482:
479:
477:
474:
473:
471:
465:
459:
456:
454:
451:
449:
446:
444:
441:
439:
436:
434:
431:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
400:
398:
392:
386:
383:
381:
378:
376:
373:
370:
366:
362:
359:
357:
354:
352:
349:
348:
346:
340:
335:
331:
330:Block ciphers
324:
319:
317:
312:
310:
305:
304:
301:
297:
293:
277:
273:
272:New York City
269:
263:
258:
257:
251:
247:
234:
216:
213:
208:
204:
200:
195:
194:
188:
186:
182:
177:
175:
169:
167:
163:
159:
154:
152:
148:
144:
140:
136:
127:
123:
119:
116:
115:cryptanalysis
111:
107:
105:
101:
98:
95:
91:
87:
85:
81:
77:
75:
71:
68:Cipher detail
66:
63:
60:
56:
53:
50:
46:
42:
38:
35:
32:
28:
23:
1592:Block cipher
1432:Key schedule
1422:Key exchange
1412:Kleptography
1370:Cryptosystem
1314:Cryptography
1164:Partitioning
1122:Side-channel
1100:
1067:Higher-order
1052:Differential
933:Key schedule
500:
280:. Retrieved
270:(FSE 2000).
264:/PostScript)
255:
233:cite journal
221:. Retrieved
207:the original
178:
170:
155:
143:block cipher
138:
135:cryptography
132:
113:Best public
16:Block cipher
1580:Mathematics
1571:Mix network
1249:Utilization
1235:NSA Suite B
1220:AES process
1169:Rubber-hose
1107:Related-key
1015:Brute-force
394:Less common
282:16 February
223:16 February
147:Joan Daemen
84:Block sizes
34:Joan Daemen
1679:Categories
1531:Ciphertext
1501:Decryption
1496:Encryption
1457:Ransomware
1199:Chi-square
1117:Rotational
1057:Impossible
978:Block size
872:Spectr-H64
696:Ladder-DES
691:Kuznyechik
636:Hierocrypt
506:BassOmatic
469:algorithms
396:algorithms
369:Triple DES
344:algorithms
215:PostScript
191:References
162:key length
158:block size
48:Successors
1521:Plaintext
1174:Black-bag
1094:Boomerang
1083:Known-key
1062:Truncated
887:Threefish
882:SXAL/MBAL
772:MultiSwap
727:MacGuffin
686:KN-Cipher
626:Grand Cru
581:CS-Cipher
561:COCONUT98
93:Structure
74:Key sizes
30:Designers
1660:Category
1566:Kademlia
1526:Codetext
1469:(CSPRNG)
1447:Machines
1225:CRYPTREC
1189:Weak key
1142:Acoustic
983:Key size
827:Red Pike
646:IDEA NXT
526:Chiasmus
521:CAST-256
501:BaseKing
486:Akelarre
481:Adiantum
448:Skipjack
413:CAST-128
408:Camellia
356:Blowfish
139:BaseKing
88:192 bits
78:192 bits
20:BaseKing
1321:General
1266:Padding
1184:Rebound
892:Treyfer
842:SAVILLE
802:PRESENT
792:NOEKEON
737:MAGENTA
732:Madryga
712:Lucifer
576:CRYPTON
385:Twofish
375:Serpent
212:gzipped
52:NOEKEON
25:General
1442:Keygen
1230:NESSIE
1179:Davies
1127:Timing
1042:Linear
1002:Attack
921:Design
912:Zodiac
877:Square
852:SHACAL
847:SC2000
807:Prince
787:Nimbus
782:NewDES
767:MULTI2
757:MISTY1
700:LOKI (
676:KHAZAD
671:KeeLoq
666:KASUMI
661:Kalyna
546:CLEFIA
531:CIKS-1
491:Anubis
342:Common
104:Rounds
1477:(PRN)
1112:Slide
968:Round
953:P-box
948:S-box
907:XXTEA
867:Speck
862:Simon
857:SHARK
837:SAFER
822:REDOC
747:Mercy
706:89/91
656:Iraqi
621:G-DES
611:FEA-M
591:DES-X
556:Cobra
511:BATON
496:Ascon
476:3-Way
467:Other
151:3-Way
141:is a
62:3-Way
1240:CNSA
1099:Mod
1025:MITM
797:NUSH
752:MESH
742:MARS
616:FROG
606:FEAL
586:DEAL
566:Crab
551:CMEA
458:XTEA
443:SEED
423:IDEA
418:GOST
403:ARIA
284:2007
246:help
225:2007
43:1994
1194:Tau
1154:XSL
958:SPN
902:xmx
897:UES
832:S-1
817:RC2
762:MMB
641:ICE
596:DFC
453:TEA
438:RC6
433:RC5
428:LEA
380:SM4
361:DES
351:AES
262:PDF
133:In
1681::
722:M8
717:M6
704:,
702:97
601:E2
367:,
274::
237::
235:}}
231:{{
201:.
168:.
137:,
124:,
108:11
1306:e
1299:t
1292:v
1101:n
1085:)
1081:(
1048:)
1044:(
1021:)
1017:(
1008:)
1004:(
994:)
990:(
812:Q
708:)
371:)
363:(
336:)
332:(
322:e
315:t
308:v
286:.
260:(
248:)
244:(
227:.
217:)
210:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.