eprint.iacr.org will be offline for approximately an hour for routine maintenance at 11pm UTC on Tuesday, April 16. We lost some data between April 12 and April 14, and some authors have been notified that they need to resubmit their papers.

Paper 2014/704

A 128-bit Block Cipher Based on Three Group Arithmetics

Shenghui Su, Shuwang Lü, and Daqiang Dong

Abstract

Enlightened by the IDEA block cipher, the authors put forward a symmetric key cryptosystem called REESSE3+ based on three group arithmetics: addition modulo 2 (bit XOR), addition modulo 2 ^ 16, and multiplication modulo 2 ^ 16 + 1. Different from IDEA, REESSE3+ uses a 128-bit block, a 256-bit key, and a renovative round function. The authors describe the REESSE3+ cipher algorithm in the graph, and expound the encryption subkeys, encryption operation, decryption subkeys, and decryption operation. Further, demonstrate the correctness of the REESSE3+ cipher algorithm, and analyze the security of REESSE3+ from four aspects. The measures for assuring the security of REESSE3+ cover those for assuring the security of IDEA, which indicates that the ability of REESSE3+ in resisting differential cryptanalysis should be at least equivalent to that of IDEA. Moreover, experiments show that a mini-version of REESSE3+ is immune to differential cryptanalysis, thus it may be expected that REESSE3+ is secure against differential attack after 8 rounds.

Note: The content has no essential change.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Block cipher algorithmSymmetric keyRound functionGroup arithmeticSecurityMarkov cipher
Contact author(s)
reesse @ 126 com
History
2017-04-30: last of 4 revisions
2014-09-09: received
See all versions
Short URL
https://ia.cr/2014/704
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/704,
      author = {Shenghui Su and Shuwang Lü and Daqiang Dong},
      title = {A 128-bit Block Cipher Based on Three Group Arithmetics},
      howpublished = {Cryptology ePrint Archive, Paper 2014/704},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/704}},
      url = {https://eprint.iacr.org/2014/704}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.