FOX Specifications Version 1.2

In this document, we describe the design of a new family of block ciphers, named FOX. The main goals of this design, besides a very high security level, are a large implementation flexibility on various platforms as well as high performances. The high-level structure is based on a Lai-Massey scheme, while the round functions are substitution-permutation networks. In addition, we propose a new design of strong and efficient key-schedule algorithms.

[1]  Eli Biham,et al.  The Rectangle Attack - Rectangling the Serpent , 2001, EUROCRYPT.

[2]  Serge Vaudenay,et al.  On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER , 1994, FSE.

[3]  Michael Luby,et al.  How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.

[4]  Alex Biryukov,et al.  Advanced Slide Attacks , 2000, EUROCRYPT.

[5]  Serge Vaudenay,et al.  Decorrelation: A Theory for Block Cipher Security , 2003, Journal of Cryptology.

[6]  Eiji Okamoto,et al.  Advances in cryptology--ASIACRYPT'99 : International Conference on the Theory and Application of Cryptology and Information Security, Singapore, November 14-18, 1999 : proceedings , 1999 .

[7]  Eli Biham,et al.  Enhancing Differential-Linear Cryptanalysis , 2002, ASIACRYPT.

[8]  Eli Biham,et al.  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.

[9]  S. Vaudenay,et al.  Perfect diffusion primitives for block ciphers - building efficient MDS matrices , 2004 .

[10]  Dorothy E. Denning,et al.  Cryptography and Data Security , 1982 .

[11]  Serge Vaudenay,et al.  FOX : A New Family of Block Ciphers , 2004, Selected Areas in Cryptography.

[12]  Don Coppersmith,et al.  Matrix multiplication via arithmetic progressions , 1987, STOC.

[13]  Serge Vaudenay,et al.  On the Lai-Massey Scheme , 1999, ASIACRYPT.

[14]  Serge Vaudenay,et al.  Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness , 1999, Selected Areas in Cryptography.

[15]  Serge Vaudenay,et al.  Black Box Cryptanalysis of Hash Networks Based on Multipermutations , 1994, EUROCRYPT.

[16]  Vincent Rijmen,et al.  The Design of Rijndael , 2002, Information Security and Cryptography.

[17]  David Wagner,et al.  Integral Cryptanalysis (Extended abstract) , 2002, FSE 2002.

[18]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[19]  Lars R. Knudsen,et al.  Truncated and Higher Order Differentials , 1994, FSE.

[20]  Susan K. Langford,et al.  Differential-Linear Cryptanalysis , 1994, CRYPTO.

[21]  Sean Murphy Comments on the Security of the AES and the XSL Technique , 2002 .

[22]  Hongjun Wu,et al.  Related-Cipher Attacks , 2002, ICICS.

[23]  Seokhie Hong,et al.  Provable Security against Differential and Linear Cryptanalysis for the SPN Structure , 2000, FSE.