Linear equation over a ring

From formulasearchengine
Revision as of 23:34, 5 January 2014 by en>D.Lazard (Properties of effective rings: clarifiction)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

My name is Winnie and I am studying Anthropology and Sociology and Modern Languages and Classics at Rillieux-La-Pape / France.

Also visit my web site ... hostgator1centcoupon.info

File:Lai Massey scheme diagram en.svg

The Lai-Massey scheme is a cryptographic structure used in the design of block ciphers.[1][2] It is used in IDEA and IDEA NXT.

Construction details

Let F be the round function and H a half-round function and let K0,K1,,Kn be the sub-keys for the rounds 0,1,,n respectively.

Then the basic operation is as follows:

Split the plaintext block into two equal pieces, (L0, R0)

For each round i=0,1,,n, compute

(Li+1,Ri+1)=H(Li+Ti,Ri+Ti)

where Ti=F(LiRi,Ki) and (L0,R0)=H(L0,R0)

Then the ciphertext is (Ln+1,Rn+1)=(Ln+1,Rn+1).

Decryption of a ciphertext (Ln+1,Rn+1) is accomplished by computing for i=n,n1,,0

(Li,Ri)=H1(Li+1Ti,Ri+1Ti)

where Ti=F(Li+1Ri+1,Ki) and (Ln+1,Rn+1)=H1(Ln+1,Rn+1)

Then (L0,R0)=(L0,R0) is the plaintext again.

The Lai-Massey scheme offers security properties similar to those of the Feistel structure. It also shares its advantage over a substitution-permutation network that the round function F does not have to be invertible.

The half-round function is required to prevent a trivial distinguishing attack (L0R0=Ln+1Rn+1). It commonly applies an orthomorphism σ on the left hand side, that is,

H(L,R)=(σ(L),R)

where both σ and xσ(x)x are permutations (in the mathematical sense, that is, a bijection – not a permutation box). Since there are no orthomorphisms for bit blocks (groups of size 2n), "almost orthomorphisms" are used instead.

H may depend on the key. If it doesn't, the last application can be omitted, since its inverse is known anyway. The last application is commonly called "round n.5" for a cipher that otherwise has n rounds.

Literature

References

  1. Aaram Yun, Je Hong Park, Jooyoung Lee: Lai-Massey Scheme and Quasi-Feistel Networks. IACR Cryptology
  2. Serge Vaudenay: On the Lai-Massey Scheme. ASIACRYPT'99

Template:Cryptography block