Knowledge

EnRUPT

Source đź“ť

277: 24: 247: 23: 314: 254: 338: 348: 197: 307: 72: 343: 333: 300: 92: 8: 153: 129: 208: 213: 288: 284: 85: 327: 103: 164: 229: 179: 110:
2 complexity meet-in-the-middle preimage attack against EnRUPT hash,
124:
is a block cipher and a family of cryptographic algorithms based on
62: 245: 115:
Chosen plaintext attack with 2 queries against EnRUPT block cipher
195: 276: 125: 50: 154:"EnRUPT: First all-in-one symmetric cryptographic primitive" 177: 325: 151: 308: 178:Khovratovich, Dmitry; Nikolić, Ivica (2008). 196:Sebastiaan Indesteege; Bart Preneel (2009). 132:but it wasn't selected to the second round. 315: 301: 147: 145: 212: 246:Sean O'Neil; Karsten Nohl; Luca Henzen. 128:. EnRUPT hash function was submitted to 283:This cryptography-related article is a 227: 142: 112:collision attack with 2 time complexity 97:8 * (plaintext words) + 4 * (key words) 77:arbitrary, at least two words (64 bits) 326: 271: 248:"EnRUPT Hash Function Specification" 13: 14: 360: 198:"Practical Collisions for EnRUPT" 275: 22: 230:"Cryptanalysis of block EnRUPT" 239: 221: 207:. FSE 2009. pp. 246–259. 189: 171: 1: 135: 287:. You can help Knowledge by 214:10.1007/978-3-642-03317-9_15 7: 10: 365: 270: 203:. In Orr Dunkelman (ed.). 86:Unbalanced Feistel Network 180:"Cryptanalysis of EnRUPT" 109: 101: 91: 81: 71: 61: 56: 46: 38: 33: 21: 205:Fast Software Encryption 228:Yarrkov, Elias (2010). 339:Broken block ciphers 152:Sean O'Neil (2008). 51:Corrected Block TEA 28:One round of EnRUPT 18: 349:Cryptography stubs 165:SASC 2008 workshop 16: 296: 295: 130:SHA-3 competition 119: 118: 356: 317: 310: 303: 279: 272: 262: 261: 260:on 13 July 2010. 259: 253:. Archived from 252: 243: 237: 236: 234: 225: 219: 218: 216: 202: 193: 187: 186: 184: 175: 169: 168: 158: 149: 26: 19: 15: 364: 363: 359: 358: 357: 355: 354: 353: 344:Feistel ciphers 324: 323: 322: 321: 268: 266: 265: 257: 250: 244: 240: 232: 226: 222: 200: 194: 190: 182: 176: 172: 161:Workshop Record 156: 150: 143: 138: 113: 39:First published 29: 12: 11: 5: 362: 352: 351: 346: 341: 336: 320: 319: 312: 305: 297: 294: 293: 280: 264: 263: 238: 220: 188: 170: 140: 139: 137: 134: 117: 116: 107: 106: 99: 98: 95: 89: 88: 83: 79: 78: 75: 69: 68: 65: 59: 58: 54: 53: 48: 44: 43: 40: 36: 35: 31: 30: 27: 9: 6: 4: 3: 2: 361: 350: 347: 345: 342: 340: 337: 335: 334:Block ciphers 332: 331: 329: 318: 313: 311: 306: 304: 299: 298: 292: 290: 286: 281: 278: 274: 273: 269: 256: 249: 242: 231: 224: 215: 210: 206: 199: 192: 181: 174: 166: 162: 155: 148: 146: 141: 133: 131: 127: 123: 114: 108: 105: 104:cryptanalysis 100: 96: 94: 90: 87: 84: 80: 76: 74: 70: 66: 64: 60: 57:Cipher detail 55: 52: 49: 45: 41: 37: 32: 25: 20: 289:expanding it 282: 267: 255:the original 241: 223: 204: 191: 173: 160: 121: 120: 111: 102:Best public 47:Derived from 73:Block sizes 328:Categories 136:References 82:Structure 63:Key sizes 67:variable 34:General 122:EnRUPT 93:Rounds 17:EnRUPT 258:(PDF) 251:(PDF) 233:(PDF) 201:(PDF) 183:(PDF) 157:(ZIP) 126:XXTEA 285:stub 42:2008 209:doi 330:: 163:. 159:. 144:^ 316:e 309:t 302:v 291:. 235:. 217:. 211:: 185:. 167:.

Index

A diagram for the EnRUPT block cipher.
Corrected Block TEA
Key sizes
Block sizes
Unbalanced Feistel Network
Rounds
cryptanalysis
XXTEA
SHA-3 competition


"EnRUPT: First all-in-one symmetric cryptographic primitive"
SASC 2008 workshop
"Cryptanalysis of EnRUPT"
"Practical Collisions for EnRUPT"
doi
10.1007/978-3-642-03317-9_15
"Cryptanalysis of block EnRUPT"
"EnRUPT Hash Function Specification"
the original
Stub icon
stub
expanding it
v
t
e
Categories
Block ciphers
Broken block ciphers
Feistel ciphers

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑