E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2, which was proposed to the AES(Advanced Encryption Standard)candidates.This algorithm supports 128-bit, 192-bit, and 256-bit secret keys.The design philosophy of E2 is highly conservative;the structure uses 12-round Feistel as its main function whose round function is constructed with 2-round SPN structure, and initial / final transformational functions.E2 has practical security against differential attack, linear attack, cryptanalysis with impossible differential, truncated differential attack, and so on.Furthermore, E2 can be implemented efficiently and flexibly on various platforms because the primitive operations involve byte length processing.
- 社団法人電子情報通信学会の論文
- 2000-01-25
著者
-
Kanda M
Nippon Telegraph And Telephone Corporation
-
Ueda H
Ntt Laboratories
-
KANDA Masayuki
NTT Laboratories
-
MORIAI Shiho
NTT Laboratories
-
AOKI Kazumaro
NTT Laboratories
-
UEDA Hiroki
NTT Laboratories
-
TAKASHIMA Youichi
NTT Laboratories
-
OHTA Kazuo
NTT Laboratories
-
MATSUMOTO Tsutomu
Yokohama National University
-
Moriai S
Nippon Telegraph And Telephone Corp. Yokosuka‐shi Jpn
-
AOKI Kazumaro
NTT Communications Corporation
-
Aoki K
Ntt Corp. Yokosuka‐shi Jpn
-
Ohta K
Univ. Electro‐communications Chofu‐shi Jpn
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
関連論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- A Summary of Security Protocol on VOD(Report of DAVIC (Digital Audio-Visual Council) held in Waseda Univ.)
- On the security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis(Special Section on Cryptography and Information Security)
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability (Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Key-Dependency of Linear Probability of RC5 (Special Section on Cryptography and Information Security)
- The Best Linear Expression Search of FEAL (Special Section on Cryptography and Information Security)
- FOREWORD (Special Section on Cryptography and Information Security)
- Optimized Software Implementations of E2(Special Section on Cryptography and Information Security)
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- The Best Differential Characteristic Search of FEAL (Special Section on Cryptography and Information Security)
- Practical Evaluation of Security against Generalized Interpolation Attack(Special Section on Cryptography and Information Security)
- Differential-Linear Cryptanalysis of FEAL-8 (Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- One-Time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash (Special Section on Cryptography and Information Security)
- Information-Flow-Based Access Control for Web Browsers
- Collision Search of a Hash Function by Using Random Mapping (Special Section on Cryptography and Information Security)
- Multi-Signature Schemes Secure against Active Insider Attacks (Special Section on Cryptography and Information Security)
- Security of the Extended Fiat-Shamir Schemes (Special Section on Cryptography and Information Security)
- Effectiveness of Outline Measures of Strength against Differential and Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- FOREWORD
- Catching the Behavioral Differences between Multiple Executions for Malware Detection