A Universal Encryption Standard

DES and triple-DES are two well-known and popular encryption algorithms, but they both have the same drawback: their block size is limited to 64 bits. While the cryptographic community is working hard to select and evaluate candidates and finalists for the AES (Advanced Encryption Standard) contest launched by NIST in 1997, it might be of interest to propose a secure and simple double block-length encryption algorithm. More than in terms of key length and block size, our Universal Encryption Standard is a new construction that remains totally compliant with DES and triple-DES specifications as well as with AES requirements.

[1]  Paul C. van Oorschot,et al.  Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude , 1996, CRYPTO.

[2]  Eli Biham,et al.  Cryptanalysis of Multiple Modes of Operation , 1994, Journal of Cryptology.

[3]  Eli Biham,et al.  Cryptanalysis of the ANSI X9.52 CBCM mode , 2001, Journal of Cryptology.

[4]  Paul C. van Oorschot,et al.  A Known Plaintext Attack on Two-Key Triple Encryption , 1991, EUROCRYPT.

[5]  Eli Biham Cryptanalysis of Triple Modes of Operation , 1999, Journal of Cryptology.

[6]  Serge Vaudenay,et al.  On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.

[7]  Bart Preneel,et al.  On the Security of Double and 2-Key Triple Modes of Operation , 1999, FSE.

[8]  Stefan Lucks On Security of the 128-Bit Block Cipher DEAL , 1999, FSE.

[9]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[10]  Stefan Lucks,et al.  Attacking Triple Encryption , 1998, FSE.

[11]  Bruce Schneier,et al.  Key-Schedule Cryptanalysis of DEAL , 1999, Selected Areas in Cryptography.

[12]  G. E. Thyer,et al.  Modes of operation , 1991 .

[13]  Eli Biham,et al.  Differential Cryptanalysis of the Data Encryption Standard , 1993, Springer New York.

[14]  Ralph Howard,et al.  Data encryption standard , 1987 .

[15]  John Gilmore,et al.  Cracking DES - secrets of encryption research, wiretap politics and chip design: how federal agencies subvert privacy , 1998 .

[16]  Joe Kilian,et al.  How to Protect DES Against Exhaustive Key Search , 1996, CRYPTO.

[17]  Lars R. Knudsen,et al.  Block Ciphers: Analysis, Design and Applications , 1994 .

[18]  Matthew J. Weiner,et al.  Efficient DES Key Search , 1994 .

[19]  David A. Wagner Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation , 1998, FSE.

[20]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[21]  Eli Biham,et al.  Recommendation for Block Cipher Modes of Operation: Methods and Techniques , 2001 .