ICE   General  Designer(s)  Matthew Kwan  First published  1997  Derived from  (DES)  Cipher(s) based on this design    Algorithm detail  Block size(s)  64 bits  Key size(s)  64 bits for ICE, 64n for ICEn  Structure  Feistel network  Number of rounds  16 for ICE, 8 for ThinICE, 16n for ICEn  Best cryptanalysis  Differential cryptanalysis can break 15 out of 16 rounds of ICE with complexity 2^{56}. ThinICE can be broken using 2^{27} chosen plaintexts with a success probability of 95%.  In cryptography, ICE (Information Concealment Engine) is a block cipher published by Kwan in 1997. The algorithm is similar in structure to DES, but with the addition of a keydependent bit permutation in the round function. The ICE algorithm is not subject to patents, and the source code has been place into the public domain. Image File history File links ICE_(cipher)_InfoBox_Diagram. ...
General Designer(s) IBM First published 1975 (January 1977 as the standard) Derived from Lucifer (cipher) Cipher(s) based on this design Triple DES, GDES, DESX, LOKI89, ICE Algorithm detail Block size(s) 64 bits Key size(s) 56 bits Structure Feistel network Number of rounds 16 Best...
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. ...
In cryptography, the key size (alternatively key length) is a measure of the number of possible keys which can be used in a cipher. ...
In cryptography, a Feistel cipher is a block cipher with a particular structure, named after IBM cryptographer Horst Feistel; it is also commonly known as a Feistel network. ...
Cryptanalysis (from the Greek kryptÃ³s, hidden, and analÃ½ein, to loosen or to untie) is the study of methods for obtaining the meaning of encrypted information, without access to the secret information which is normally required to do so. ...
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. ...
The German Lorenz cipher machine Cryptography or cryptology is a field of mathematics and computer science concerned with information security and related issues, particularly encryption and authentication. ...
Encryption Decryption In cryptography, a block cipher is a symmetric key cipher which operates on fixedlength groups of bits, termed blocks, with an unvarying transformation. ...
General Designer(s) IBM First published 1975 (January 1977 as the standard) Derived from Lucifer (cipher) Cipher(s) based on this design Triple DES, GDES, DESX, LOKI89, ICE Algorithm detail Block size(s) 64 bits Key size(s) 56 bits Structure Feistel network Number of rounds 16 Best...
ICE is a Feistel network with a block size of 64 bits. The standard ICE algorithm takes a 64bit key and has 16 rounds. A fast variant, ThinICE, uses only 8 rounds. An openended variant, ICEn, uses 16n rounds with 64n bit key. In cryptography, a Feistel cipher is a block cipher with a particular structure, named after IBM cryptographer Horst Feistel; it is also commonly known as a Feistel network. ...
In modern cryptography, symmetric key ciphers are generally divided into stream ciphers and block ciphers. ...
Van Rompay et al (1998) attempted to apply differential cryptanalysis to ICE. They described an attack on ThinICE which recovers the secret key using 2^{23} chosen plaintexts with a 25% success probability. If 2^{27} chosen plaintexts are used, the probability can be improved to 95%. For the standard version of ICE, an attack on 15 out of 16 rounds was found, requiring 2^{56} work and at most 2^{56} chosen plaintexts. Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. ...
A chosen plaintext attack is any form of cryptanalysis which presumes that the attacker has the capability to choose arbitrary plaintexts to be encrypted and obtain the corresponding ciphertexts. ...
References
 Matthew Kwan, The Design of the ICE Encryption Algorithm, Fast Software Encryption 1997, pp69–82 [1].
 Bart van Rompay, Lars R. Knudsen and Vincent Rijmen, Differential Cryptanalysis of the ICE Encryption Algorithm, Fast Software Encryption 1998, pp270–283 (PDF).
External links
