FACTOID # 17: Though Rhode Island is the smallest state in total area, it has the longest official name: The State of Rhode Island and Providence Plantations.
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 


FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:



(* = Graphable)



Encyclopedia > Akelarre (cipher)

Akelarre is a block cipher proposed in 1996, and combined features from IDEA and RC5. It was shown to be susceptible even to a ciphertext-only attack in 2000 (Knudsen and Rijmen, 2000). In cryptography, a block cipher is a type of symmetric key cipher which operates on groups of bits of a fixed length, termed blocks. ... 1996 is a leap year starting on Monday of the Gregorian calendar, and was designated the International Year for the Eradication of Poverty. ... In cryptography, the International Data Encryption Algorithm (IDEA) is a block cipher designed by Xuejia Lai and James L. Massey of ETH-Zürich and was first described in 1991. ... One round (two half-rounds) of the RC5 block cipher RC5 is a block cipher notable for its simplicity. ... In cryptography, a ciphertext-only attack is a form of cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. ... 2000 is a leap year starting on Saturday of the Gregorian calendar. ...

Akelarre is a 128-bit block cipher with a variable key-length which must be some multiple of 64 bits. The number of rounds is variable, but four are suggested. The round function of Akelarre is similar to IDEA in structure.


  • Lars Knudsen and Vincent Rijmen, Ciphertext-only Attack on Akelarre, Cryptologia, Vol. 24(2), April 2000, pp135–147.
  • G. Álvarez Marañón, A. Fúster Sabater, D. Guía Martínez, F. Montoya Vitini y A. Peinado Domínguez, Akelarre: a New Block Cipher Algorithm, pp1–14, in proceedings of SAC'96, Third Annual Workshop on Selected Areas in Cryptography, Queen's University, Kingston, Ontario, 1996 [1]  (http://www.iec.csic.es/~gonzalo/publis/papers/Akelarre.zip).
  • Niels Ferguson and Bruce Schneier, Cryptanalysis of Akelarre, Fourth Annual Workshop on Selected Areas in Cryptography, August 1997, pp201–212 (PDF)  (http://www.schneier.com/paper-akelarre.pdf).

Lars R. Knudsen Lars Ramkilde Knudsen (born February 21, 1962) is a Danish researcher in cryptography, particularly the design and analysis of block ciphers, hash functions and message authentication codes (MACs). ... Vincent Rijmen (born 16 October 1970) is a cryptographer and one of the designers of the Advanced Encryption Standard. ... Cryptologia is a journal in cryptography published quarterly since 1977. ... Bruce Schneier Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security expert, and writer. ...

Block ciphers edit  (http://en.wikipedia.org/w/index.php?title=Template:Block_ciphers&action=edit)
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL   Standardisation: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key

  Results from FactBites:
Differential Cryptanalysis & Linear Cryptanalysis (989 words)
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions.
In the case of a block cipher, it refers to a set of techniques for tracing differences through the network of transformations, discovering where the cipher exhibits non-random behaviour, and exploiting such properties to recover the secret key.
An early target for the attack was the FEAL block cipher.
  More results at FactBites »



Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m