Constructing symmetric ciphers using the CAST design procedure (Q1369727): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Removed claim: reviewed by (P1447): Item:Q587571
Created claim: DBLP publication ID (P1635): journals/dcc/Adams97, #quickstatements; #temporary_batch_1731530891435
 
(3 intermediate revisions by 3 users not shown)
Property / reviewed by
 
Property / reviewed by: Jozef Vyskoč / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1023/a:1008229029587 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2149110252 / rank
 
Normal rank
Property / DBLP publication ID
 
Property / DBLP publication ID: journals/dcc/Adams97 / rank
 
Normal rank

Latest revision as of 22:02, 13 November 2024

scientific article
Language Label Description Also known as
English
Constructing symmetric ciphers using the CAST design procedure
scientific article

    Statements

    Constructing symmetric ciphers using the CAST design procedure (English)
    0 references
    0 references
    27 January 1998
    0 references
    The paper presents a description of the CAST design procedure for the construction of a family of encryption algorithms that besides possessing a number of desirable cryptographic properties also appear to be resistant to differential cryptanalysis, linear cryptanalysis and related-key cryptanalysis as well. First, an overview of the CAST design procedure is given. Four main aspects of a CAST cipher, i.e. s-box design, basic CAST design framework, key schedule and round function design, are briefly discussed here. In the next section a more detailed presentation of these four aspects is given together with a number of assertions, theorems and remarks concerning the cryptographic properties related to each aspect. Finally, alternative design choices are discussed and the whole procedure is illustrated by an example of CAST cipher design.
    0 references
    block ciphers
    0 references
    s-boxes
    0 references
    linear cryptanalysis
    0 references
    differential cryptanalysis
    0 references
    design of encryption algorithms
    0 references
    0 references

    Identifiers