New block encryption algorithm MISTY. We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY1 and MISTY2. They are designed on the basis of the theory of provable security against differential and linear cryptanalysis, and moreover they realize high speed encryption on hardware platforms as well as on software environments. Our software implementation shows that MISTY1 with eight rounds can encrypt a data stream in CBC mode at a speed of 20Mbps and 40Mbps on Pentium/100MHz and PA-7200/120MHz, respectively. For its hardware performance, we have produced a prototype LSI by a process of 0.5$mu$ CMOS gate-array and confirmed a speed of 450Mbps. In this paper, we describe the detailed specifications and design principles of MISTY1 and MISTY2.

References in zbMATH (referenced in 24 articles , 1 standard article )

Showing results 1 to 20 of 24.
Sorted by year (citations)

1 2 next

  1. Carlet, Claude; Chen, Xi; Qu, Longjiang: Constructing infinite families of low differential uniformity ((n), (m))-functions with (m>n/2) (2019)
  2. Xu, Xiaofang; Li, Chunlei; Zeng, Xiangyong; Helleseth, Tor: Constructions of complete permutation polynomials (2018)
  3. Todo, Yosuke: Integral cryptanalysis on full MISTY1 (2017)
  4. Bar-On, Achiya; Keller, Nathan: A (2^70) attack on the full MISTY1 (2016)
  5. Biryukov, Alex; Dinu, Daniel; Großschädl, Johann: Correlation power analysis of lightweight block ciphers: from theory to practice (2016)
  6. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  7. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  8. Carlet, Claude; Alsalami, Yousuf: A new construction of differentially 4-uniform ((n,n-1))-functions (2015)
  9. Dunkelman, Orr; Keller, Nathan: Practical-time attacks against reduced variants of MISTY1 (2015)
  10. Dunkelman, Orr; Keller, Nathan; Shamir, Adi: A practical-time related-key attack on the \textttKASUMIcryptosystem used in GSM and 3G telephony (2014)
  11. Huang, Jialin; Lai, Xuejia: Revisiting key schedule’s diffusion in relation with round function’s diffusion (2014)
  12. Huang, Jialin; Lai, Xuejia: What is the effective key length for a block cipher: an attack on every practical block cipher (2014)
  13. Li, Ruilin; Li, Chao; Su, Jinshu; Sun, Bing: Security evaluation of MISTY structure with SPN round function (2013)
  14. Nguyen, Phuong Ha; Robshaw, Matthew J. B.; Wang, Huaxiong: On related-key attacks and KASUMI: the case of A5/3 (2011)
  15. Yun, Aaram; Park, Je Hong; Lee, Jooyoung: On Lai-Massey and quasi-Feistel ciphers (2011)
  16. Cook, Debra L.; Yung, Moti; Keromytis, Angelos D.: Elastic block ciphers: method, security and instantiations (2009) ioport
  17. Daemen, Joan; Rijmen, Vincent: New criteria for linear maps in AES-like ciphers (2009)
  18. Dunkelman, Orr; Keller, Nathan: An improved impossible differential attack on MISTY1 (2008)
  19. Danielsen, Lars Eirik; Gulliver, T. Aaron; Parker, Matthew G.: Aperiodic propagation criteria for Boolean functions (2006)
  20. Tsunoo, Yukiyasu; Tsujihara, Etsuko; Shigeri, Maki; Kubo, Hiroyasu; Minematsu, Kazuhiko: Improving cache attacks by considering cipher structure (2006) ioport

1 2 next