Paper 2014/704

A 128-bit Block Cipher Based on Three Group Arithmetics

Shenghui Su, Shuwang Lü, and Daqiang Dong

Abstract

Enlightened by the IDEA block cipher, the authors put forward a symmetric key cryptosystem called REESSE3+ based on three group arithmetics: addition modulo 2 (bit XOR), addition modulo 2 ^ 16, and multiplication modulo 2 ^ 16 + 1. Different from IDEA, REESSE3+ uses a 128-bit block, a 256-bit key, and a renovative round function. The authors describe the REESSE3+ cipher algorithm in the graph, and expound the encryption subkeys, encryption operation, decryption subkeys, and decryption operation. Further, demonstrate the correctness of the REESSE3+ cipher algorithm, and analyze the security of REESSE3+ from four aspects. The measures for assuring the security of REESSE3+ cover those for assuring the security of IDEA, which indicates that the ability of REESSE3+ in resisting differential cryptanalysis should be at least equivalent to that of IDEA. Moreover, experiments show that a mini-version of REESSE3+ is immune to differential cryptanalysis, thus it may be expected that REESSE3+ is secure against differential attack after 8 rounds.

Note: The content has no essential change.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Keywords
Block cipher algorithmSymmetric keyRound functionGroup arithmeticSecurityMarkov cipher
Contact author(s)
reesse @ 126 com
History
2017-04-30: last of 4 revisions
2014-09-09: received
See all versions
Short URL
https://ia.cr/2014/704
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/704,
      author = {Shenghui Su and Shuwang Lü and Daqiang Dong},
      title = {A 128-bit Block Cipher Based on Three Group Arithmetics},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/704},
      year = {2014},
      url = {https://eprint.iacr.org/2014/704}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.