词条 | SXAL/MBAL |
释义 |
| name = SXAL | designers = Laurel Intelligent Systems | publish date = December 1993 | derived from = | derived to = | related to = | key size = 64 bits | block size = 64 bits | structure = Substitution-permutation network | rounds = 8 | cryptanalysis = Differential and linear cryptanalysis[1] }} In cryptography, SXAL (Substitution Xor ALgorithm, sometimes called SXAL8) is a block cipher designed in 1993 by Yokohama-based Laurel Intelligent Systems. It is normally used in a special mode of operation called MBAL (Multi Block ALgorithm). SXAL/MBAL has been used for encryption in a number of Japanese PC cards and smart cards. SXAL is an 8-round substitution-permutation network with block size and key size of 64 bits each. All operations are byte-oriented. The algorithm uses a single 8×8-bit S-box K, designed so that both K(X) and X XOR K(X) are injective functions. In each round, the bytes of the block are first permuted. Then each byte is XORed with a key byte and an earlier ciphertext byte, processed through the S-box, and XORed with the previous plaintext byte. The key schedule is rather complex, processing the key with SXAL itself, beginning with a null key and using permuted intermediate results as later keys. MBALMBAL is an encryption algorithm built using SXAL that can be applied to messages any number of bytes in length (at least 8). It uses two 64-bit extended keys for key whitening on the first 64 bits. The algorithm consists of 9 steps:
MBAL has been shown to be susceptible to both differential cryptanalysis and linear cryptanalysis.[1] References1. ^1 {{cite book | last = Schneier | first = Bruce | authorlink = Bruce Schneier| title = Applied Cryptography | edition = 2nd | publisher = John Wiley & Sons | year = 1996| page = 344 | isbn = 0-471-11709-9 }} External links
1 : Broken block ciphers |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。