Spectr-H64 - Wikipedia

Có thể bạn quan tâm

Jump to content

Contents

move to sidebar hide
  • (Top)
  • 1 Cryptanalysis
  • 2 References
  • 3 Further reading
  • Article
  • Talk
English
  • Read
  • Edit
  • View history
Tools Tools move to sidebar hide Actions
  • Read
  • Edit
  • View history
General
  • What links here
  • Related changes
  • Upload file
  • Page information
  • Cite this page
  • Get shortened URL
  • Download QR code
Print/export
  • Download as PDF
  • Printable version
In other projects
  • Wikidata item
Appearance move to sidebar hide From Wikipedia, the free encyclopedia Block cipher Spectr-H64
General
DesignersN.D. Goots, A.A. Moldovyan and N.A. Moldovyan
First published2001
SuccessorsCIKS-1
Cipher detail
Key sizes256 bits
Block sizes64 bits
StructureFeistel-like network
Rounds12
Best public cryptanalysis
Slide attack using 217 chosen plaintexts

In cryptography, Spectr-H64 is a block cipher designed in 2001 by N. D. Goots, A. A. Moldovyan and N. A. Moldovyan. It relies heavily on the permutation of individual bits, so is much better suited to implementation in hardware than in software.

The algorithm has a block size of 64 bits and key size of 256 bits. It uses a 12-round structure in which half of the block determines the transformation of the other half in each round, similar to a Feistel cipher or RC5. This same basic design was repeated in its successor, CIKS-1.

Cryptanalysis

[edit]

An analysis of Spectr-H64 was presented in 2002 by Selçuk Kavut and Melek D Yücel of the Middle East Technical University, showing a method of using a differential attack to retrieve half of the key bits when a single round is used. Using this method, they then presented a slide attack that requires 217 chosen plaintexts to return all key bits on the full 12 rounds.

References

[edit]
  • Selçuk Kavut and Melek D. Yücel (2002). Slide Attack on Spectr-H64 (PDF). 3rd International Conference on Cryptology in India (Indocrypt 2002). Springer. doi:10.1007/3-540-36231-2_4. ISBN 9783540002635.

Further reading

[edit]
  • Youngdai Ko; Deukjo Hong; Seokhie Hong; Sangjin Lee & Jongin Lim (2003). "Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property". Computer Network Security. Springer. pp. 298–307. doi:10.1007/b12005. ISBN 978-3-540-40797-3. S2CID 40014063.
  • Youngdai Ko; Changhoon Lee; Seokhie Hong & Sangjin Lee (2004). "Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1". Information Security and Privacy. Springer. pp. 137–148. doi:10.1007/b98755. ISBN 978-3-540-22379-5. S2CID 33167926.
  • v
  • t
  • e
Block ciphers (security summary)
Commonalgorithms
  • AES
  • Blowfish
  • DES (internal mechanics, Triple DES)
  • Serpent
  • SM4
  • Twofish
Less commonalgorithms
  • ARIA
  • Camellia
  • CAST-128
  • GOST
  • IDEA
  • LEA
  • RC5
  • RC6
  • SEED
  • Skipjack
  • TEA
  • XTEA
Otheralgorithms
  • 3-Way
  • Adiantum
  • Akelarre
  • Anubis
  • Ascon
  • BaseKing
  • BassOmatic
  • BATON
  • BEAR and LION
  • CAST-256
  • Chiasmus
  • CIKS-1
  • CIPHERUNICORN-A
  • CIPHERUNICORN-E
  • CLEFIA
  • CMEA
  • Cobra
  • COCONUT98
  • Crab
  • Cryptomeria/C2
  • CRYPTON
  • CS-Cipher
  • DEAL
  • DES-X
  • DFC
  • E2
  • FEAL
  • FEA-M
  • FROG
  • G-DES
  • Grand Cru
  • Hasty Pudding cipher
  • Hierocrypt
  • ICE
  • IDEA NXT
  • Intel Cascade Cipher
  • Iraqi
  • Kalyna
  • KASUMI
  • KeeLoq
  • KHAZAD
  • Khufu and Khafre
  • KN-Cipher
  • Kuznyechik
  • Ladder-DES
  • LOKI (97, 89/91)
  • Lucifer
  • M6
  • M8
  • MacGuffin
  • Madryga
  • MAGENTA
  • MARS
  • Mercy
  • MESH
  • MISTY1
  • MMB
  • MULTI2
  • MultiSwap
  • New Data Seal
  • NewDES
  • Nimbus
  • NOEKEON
  • NUSH
  • PRESENT
  • Prince
  • Q
  • QARMA
  • RC2
  • REDOC
  • Red Pike
  • S-1
  • SAFER
  • SAVILLE
  • SC2000
  • SHACAL
  • SHARK
  • Simon
  • Speck
  • Spectr-H64
  • Square
  • SXAL/MBAL
  • Threefish
  • Treyfer
  • UES
  • xmx
  • XXTEA
  • Zodiac
Design
  • Feistel network
  • Key schedule
  • Lai–Massey scheme
  • Product cipher
  • S-box
  • P-box
  • SPN
  • Confusion and diffusion
  • Round
  • Avalanche effect
  • Block size
  • Key size
  • Key whitening (Whitening transformation)
Attack(cryptanalysis)
  • Brute-force (EFF DES cracker)
  • MITM
    • Biclique attack
    • 3-subset MITM attack
  • Linear (Piling-up lemma)
  • Differential
    • Impossible
    • Truncated
    • Higher-order
  • Differential-linear
  • Distinguishing (Known-key)
  • Integral/Square
  • Boomerang
  • Mod n
  • Related-key
  • Slide
  • Rotational
  • Side-channel
    • Timing
    • Power-monitoring
    • Electromagnetic
    • Acoustic
    • Differential-fault
  • XSL
  • Interpolation
  • Partitioning
  • Rubber-hose
  • Black-bag
  • Davies
  • Rebound
  • Weak key
  • Tau
  • Chi-square
  • Time/memory/data tradeoff
Standardization
  • AES process
  • CRYPTREC
  • NESSIE
  • NSA Suite B
  • CNSA
Utilization
  • Initialization vector
  • Mode of operation
  • Padding
  • v
  • t
  • e
Cryptography
General
  • History of cryptography
  • Outline of cryptography
  • Classical cipher
  • Cryptographic protocol
    • Authentication protocol
  • Cryptographic primitive
  • Cryptanalysis
  • Cryptocurrency
  • Cryptosystem
  • Cryptographic nonce
  • Cryptovirology
  • Hash function
    • Cryptographic hash function
    • Key derivation function
    • Secure Hash Algorithms
  • Digital signature
  • Kleptography
  • Key (cryptography)
  • Key exchange
  • Key generator
  • Key schedule
  • Key stretching
  • Keygen
  • Machines
  • Ransomware
  • Random number generation
    • Cryptographically secure pseudorandom number generator (CSPRNG)
  • Pseudorandom noise (PRN)
  • Secure channel
  • Insecure channel
  • Subliminal channel
  • Encryption
  • Decryption
  • End-to-end encryption
  • Harvest now, decrypt later
  • Information-theoretic security
  • Plaintext
  • Codetext
  • Ciphertext
  • Shared secret
  • Trapdoor function
  • Trusted timestamping
  • Key-based routing
  • Onion routing
  • Garlic routing
  • Kademlia
  • Mix network
Mathematics
  • Cryptographic hash function
  • Block cipher
  • Stream cipher
  • Symmetric-key algorithm
  • Authenticated encryption
  • Public-key cryptography
  • Quantum key distribution
  • Quantum cryptography
  • Post-quantum cryptography
  • Message authentication code
  • Random numbers
  • Steganography
  • Category
Stub icon

This cryptography-related article is a stub. You can help Wikipedia by expanding it.

  • v
  • t
  • e
Retrieved from "https://en.wikipedia.org/w/index.php?title=Spectr-H64&oldid=1186464456" Categories:
  • Block ciphers
  • Broken block ciphers
  • Cryptography stubs
Hidden categories:
  • Articles with short description
  • Short description is different from Wikidata
  • All stub articles
Search Search Toggle the table of contents Spectr-H64 Add languages Add topic

Từ khóa » H6-4