Camellia

Camellia: a 128-bit block cipher and suitable for multiple platforms -- design and analysis. We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e., the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia provides strong security against differential and linear cryptanalyses. Compared to the AES finalists, i.e., MARS, RC6, Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation of Camellia in assembly language can encrypt on a Pentium III (800 MHz) at the rate of more than 276 Mbits per second, which is much faster than the speed of an optimized DES implementation. In addition, a distinguishing feature is its small hardware design. The hardware design, which includes encryption and decryption and key schedule, occupies approximately 11K gates, which is the smallest among all existing 128-bit block ciphers as far as we know.


References in zbMATH (referenced in 54 articles )

Showing results 1 to 20 of 54.
Sorted by year (citations)

1 2 3 next

  1. Blondeau, Céline; Nyberg, Kaisa: Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity (2017)
  2. Calderini, M.; Sala, M.; Villa, I.: A note on APN permutations in even dimension (2017)
  3. Huang, Jialin; Yan, Hailun; Lai, Xuejia: Transposition of AES key schedule (2017)
  4. Shen, Xuan; Liu, Guoqiang; Sun, Bing; Li, Chao: Impossible differentials of SPN ciphers (2017)
  5. Xu, Yuwei; Li, Yongqiang; Wu, Chuankun; Liu, Feng: On the construction of differentially 4-uniform involutions (2017)
  6. Ashur, Tomer; Rijmen, Vincent: On linear hulls and trails (2016)
  7. Derbez, Patrick; Fouque, Pierre-Alain: Automatic search of meet-in-the-middle and impossible differential attacks (2016)
  8. Gérault, David; Lafourcade, Pascal: Related-key cryptanalysis of Midori (2016)
  9. Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu: Extended meet-in-the-middle attacks on some Feistel constructions (2016)
  10. Guo, Zhiyuan; Wu, Wenling; Gao, Si: Constructing lightweight optimal diffusion primitives with Feistel structure (2016)
  11. Jia, Keting; Wang, Ning: Impossible differential cryptanalysis of 14-round Camellia-192 (2016)
  12. Lin, Li; Wu, Wenling; Zheng, Yafei: Improved meet-in-the-middle distinguisher on Feistel schemes (2016)
  13. Qu, Longjiang; Tan, Yin; Li, Chao; Gong, Guang: More constructions of differentially 4-uniform permutations on $\mathbb F_2^2k$ (2016)
  14. Todo, Yosuke; Aoki, Kazumaro: Wide trail design strategy for binary mixcolumns. Enhancing lower bound of number of active S-boxes (2016)
  15. Blondeau, Céline: Impossible differential attack on 13-round Camellia-192 (2015)
  16. Blondeau, Céline; Nyberg, Kaisa: Perfect nonlinear functions and cryptography (2015)
  17. Castiglione, Arcangelo; Palmieri, Francesco; Fiore, Ugo; Castiglione, Aniello; De Santis, Alfredo: Modeling energy-efficient secure communications in multi-mode wireless mobile devices (2015)
  18. Dong, Xiaoyang; Li, Leibo; Jia, Keting; Wang, Xiaoyun: Improved attacks on reduced-round camellia-128/192/256 (2015)
  19. Gulcan, Ege; Aysu, Aydin; Schaumont, Patrick: BitCryptor: bit-serialized flexible crypto engine for lightweight applications (2015)
  20. Wu, Wenling; Zhang, Lei; Yu, Xiaoli: The DBlock family of block ciphers (2015)

1 2 3 next