FACTOID # 17: Though Rhode Island is the smallest state in total area, it has the longest official name: The State of Rhode Island and Providence Plantations.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Akelarre (cipher)

Akelarre is a block cipher proposed in 1996, and combined features from IDEA and RC5. It was shown to be susceptible even to a ciphertext-only attack in 2000 (Knudsen and Rijmen, 2000). In cryptography, a block cipher is a type of symmetric key cipher which operates on groups of bits of a fixed length, termed blocks. ... 1996 is a leap year starting on Monday of the Gregorian calendar, and was designated the International Year for the Eradication of Poverty. ... In cryptography, the International Data Encryption Algorithm (IDEA) is a block cipher designed by Xuejia Lai and James L. Massey of ETH-Zürich and was first described in 1991. ... One round (two half-rounds) of the RC5 block cipher RC5 is a block cipher notable for its simplicity. ... In cryptography, a ciphertext-only attack is a form of cryptanalysis where the attacker is assumed to have access only to a set of ciphertexts. ... 2000 is a leap year starting on Saturday of the Gregorian calendar. ...


Akelarre is a 128-bit block cipher with a variable key-length which must be some multiple of 64 bits. The number of rounds is variable, but four are suggested. The round function of Akelarre is similar to IDEA in structure.


References

  • Lars Knudsen and Vincent Rijmen, Ciphertext-only Attack on Akelarre, Cryptologia, Vol. 24(2), April 2000, pp135–147.
  • G. Álvarez Marañón, A. Fúster Sabater, D. Guía Martínez, F. Montoya Vitini y A. Peinado Domínguez, Akelarre: a New Block Cipher Algorithm, pp1–14, in proceedings of SAC'96, Third Annual Workshop on Selected Areas in Cryptography, Queen's University, Kingston, Ontario, 1996 [1]  (http://www.iec.csic.es/~gonzalo/publis/papers/Akelarre.zip).
  • Niels Ferguson and Bruce Schneier, Cryptanalysis of Akelarre, Fourth Annual Workshop on Selected Areas in Cryptography, August 1997, pp201–212 (PDF)  (http://www.schneier.com/paper-akelarre.pdf).


Lars R. Knudsen Lars Ramkilde Knudsen (born February 21, 1962) is a Danish researcher in cryptography, particularly the design and analysis of block ciphers, hash functions and message authentication codes (MACs). ... Vincent Rijmen (born 16 October 1970) is a cryptographer and one of the designers of the Advanced Encryption Standard. ... Cryptologia is a journal in cryptography published quarterly since 1977. ... Bruce Schneier Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security expert, and writer. ...

Block ciphers edit  (http://en.wikipedia.org/w/index.php?title=Template:Block_ciphers&action=edit)
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL   Standardisation: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key

  Results from FactBites:
 
Differential Cryptanalysis & Linear Cryptanalysis (989 words)
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions.
In the case of a block cipher, it refers to a set of techniques for tracing differences through the network of transformations, discovering where the cipher exhibits non-random behaviour, and exploiting such properties to recover the secret key.
An early target for the attack was the FEAL block cipher.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m