FACTOID # 20: Statistically, Delaware bears more cost of the US Military than any other state.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > FOX (cipher)
IDEA NXT (FOX)
Round function for NXT128
General
Designer(s) Pascal Junod, Serge Vaudenay
First published 2003
Derived from IDEA
Cipher(s) based on this design None
Algorithm detail
Block size(s) 64, 128 bits
Key size(s) 0-256 bits
Structure Lai-Massey scheme
Number of rounds 12
Best cryptanalysis
Integral attack on 7 round FOX-64 with time complexity of 2237.4 and on 5 round FOX-128 with time complexity of 2205.6 by Wu Wenling, Zhang Wentao, and Feng Dengguo.

In cryptography, the FOX (now called IDEA NXT) algorithm is a block cipher designed by Pascal Junod and Serge Vaudenay of EPFL (Lausanne, Switzerland). It was conceived between 2001 and 2003, the project was originally named FOX and was published in 2003. In May 2005 it was announced by MediaCrypt under the name IDEA NXT. IDEA NXT is the successor of the IDEA algorithm and it uses an extended Lai-Massey scheme known for its robustness to cryptanalysis. It was mandated by MediaCrypt, a Swiss company owner of the distribution rights on IDEA and the patents of IDEA NXT. The IDEA NXT cipher is a family of different sub-ciphers with various blocks and keys size : Standard NXT64 (block of 64 bits, key of 128 bits, 12 rounds) and Standard NXT128 (block of 128 bits, key of 256 bits, 12 rounds). Variations of the Standard versions can be built (key of 0-256 bits, round numbers from 2-255). Also individual tables (sbox, permutation matrix) can be loaded, replacing the Standard table. Image File history File links Round function in the FOX cipher. ... Serge Vaudenay (1968-) is a well-known French cryptographer. ... 2003 (MMIII) is a common year starting on Wednesday of the Gregorian calendar. ... In cryptography, the International Data Encryption Algorithm (IDEA) is a block cipher designed by Xuejia Lai and James L. Massey of ETH-Zürich and was first described in 1991. ... In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. ... In cryptography, the key size (alternatively key length) is a measure of the number of possible keys which can be used in a cipher. ... Cryptanalysis (from the Greek kryptós, hidden, and analýein, to loosen or to untie) is the study of methods for obtaining the meaning of encrypted information without access to the secret information which is normally required to do so. ... Cryptography - Wikipedia, the free encyclopedia /**/ @import /skins-1. ... In cryptography, a block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. ... Serge Vaudenay (1968-) is a well-known French cryptographer. ... The Monster Clothespin from Outer Space, and entrance of the EPFL The École Polytechnique Fédérale de Lausanne (EPFL) is the Swiss Federal Institute of Technology in Lausanne in Switzerland. ... Location within Switzerland Lausanne (46° 31′ 10″ N, 6° 37′ 56″ E) is a city in the French-speaking part of Switzerland, situated on the shores of Lake Geneva (French: Lac Léman), and facing Évian-les-Bains (France). ... In cryptography, the International Data Encryption Algorithm (IDEA) is a block cipher designed by Xuejia Lai and James L. Massey of ETH-Zürich and was first described in 1991. ...


This cipher and its key management are patented. It is now sold by MediaCrypt under the name of IDEA NXT. A patent is a set of exclusive rights granted by a state to a person for a fixed period of time in exchange for the regulated, public disclosure of certain details of a device, method, process or composition of matter (substance) (known as an invention) which is new, inventive and...


External links


Block ciphers edit
Algorithms: 3-Way | AES | Akelarre | Anubis | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | CS-Cipher | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | Noekeon | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential cryptanalysis | Mod n Related key | XSL   Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m