Constructing symmetric ciphers using the CAST design procedure (Q1369727): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Created claim: DBLP publication ID (P1635): journals/dcc/Adams97, #quickstatements; #temporary_batch_1731530891435 |
||
(4 intermediate revisions by 3 users not shown) | |||
Property / reviewed by | |||
Property / reviewed by: Jozef Vyskoč / rank | |||
Property / reviewed by | |||
Property / reviewed by: Jozef Vyskoč / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1023/a:1008229029587 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2149110252 / rank | |||
Normal rank | |||
Property / DBLP publication ID | |||
Property / DBLP publication ID: journals/dcc/Adams97 / rank | |||
Normal rank |
Latest revision as of 22:02, 13 November 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Constructing symmetric ciphers using the CAST design procedure |
scientific article |
Statements
Constructing symmetric ciphers using the CAST design procedure (English)
0 references
27 January 1998
0 references
The paper presents a description of the CAST design procedure for the construction of a family of encryption algorithms that besides possessing a number of desirable cryptographic properties also appear to be resistant to differential cryptanalysis, linear cryptanalysis and related-key cryptanalysis as well. First, an overview of the CAST design procedure is given. Four main aspects of a CAST cipher, i.e. s-box design, basic CAST design framework, key schedule and round function design, are briefly discussed here. In the next section a more detailed presentation of these four aspects is given together with a number of assertions, theorems and remarks concerning the cryptographic properties related to each aspect. Finally, alternative design choices are discussed and the whole procedure is illustrated by an example of CAST cipher design.
0 references
block ciphers
0 references
s-boxes
0 references
linear cryptanalysis
0 references
differential cryptanalysis
0 references
design of encryption algorithms
0 references