Jump to content

REDOC: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Adding local short description: "Family of block ciphers", overriding Wikidata description "block cipher" (Shortdesc helper)
Clean up
 
(One intermediate revision by one other user not shown)
Line 1: Line 1:
{{Short description|Family of block ciphers}}
{{Short description|Family of block ciphers}}
In [[cryptography]], '''REDOC II''' and '''REDOC III''' are [[block cipher]]s designed by [[Michael Wood (cryptographer)]] for Cryptech Inc and are optimised for use in software. Both REDOC ciphers are patented.<ref>Bruce Schneier ''Applied cryptography: protocols, algorithms, and source code in C'' 1996 "REDOC III REDOC HI is a streamlined version of REDOC n, also designed by Michael Wood [1615]. It operates on an 80-bit block. The key length is variable and can be as large as 2560 bytes (20,480 bits). "</ref>
In [[cryptography]], '''REDOC II''' and '''REDOC III''' are [[block cipher]]s designed by cryptographer [[Michael Wood (cryptographer)|Michael Wood]] for Cryptech Inc and are optimised for use in software. Both REDOC ciphers are patented.<ref>Bruce Schneier ''Applied cryptography: protocols, algorithms, and source code in C'' 1996 "REDOC III REDOC HI is a streamlined version of REDOC n, also designed by Michael Wood [1615]. It operates on an 80-bit block. The key length is variable and can be as large as 2560 bytes (20,480 bits). "</ref>


REDOC II (Cusick and Wood, 1990) operates on 80-bit blocks with a 160-bit key. The cipher has 10 rounds, and uses key-dependent [[S-box]]es and ''masks'' used to select the tables for use in different rounds of the cipher. Cusick found an attack on one round, and Biham and Shamir (1991) used [[differential cryptanalysis]] to attack one round with 2300 encryptions. Biham and Shamir also found a way of recovering three masks for up to four rounds faster than exhaustive search. A prize of US$5,000 was offered for the best attack on one round of REDOC-II, and $20,000 for the best practical [[known-plaintext attack]].
REDOC II (Cusick and Wood, 1990) operates on 80-bit blocks with a 160-bit key. The cipher has 10 rounds, and uses key-dependent [[S-box]]es and ''masks'' used to select the tables for use in different rounds of the cipher. Cusick found an attack on one round, and Biham and Shamir (1991) used [[differential cryptanalysis]] to attack one round with 2300 encryptions. Biham and Shamir also found a way of recovering three masks for up to four rounds faster than exhaustive search. A prize of US$5,000 was offered for the best attack on one round of REDOC-II, and $20,000 for the best practical [[known-plaintext attack]].


REDOC III is a more efficient cipher. It operates on an [[Block_size_(cryptography)|80-bit block]] and accepts a variable-length key of up to 20,480 bits. The algorithm consists only of [[XOR]]ing key bytes with message bytes, and uses no permutations or substitutions. Ken Shirriff describes a differential attack on REDOC-III requiring 2<sup>20</sup> [[chosen plaintext]]s and 2<sup>30</sup> memory.
REDOC III is a more efficient cipher. It operates on an [[Block size (cryptography)|80-bit block]] and accepts a variable-length key of up to 20,480 bits. The algorithm consists only of [[XOR]]ing key bytes with message bytes, and uses no permutations or substitutions. Ken Shirriff describes a differential attack on REDOC-III requiring 2<sup>20</sup> [[chosen plaintext]]s and 2<sup>30</sup> memory.


==References==
==References==
Line 10: Line 10:
{{reflist}}
{{reflist}}
* Thomas W. Cusick and Michael C. Wood: The REDOC II Cryptosystem, CRYPTO 1990, pp545–563.
* Thomas W. Cusick and Michael C. Wood: The REDOC II Cryptosystem, CRYPTO 1990, pp545–563.
* Eli Biham and Adi Shamir, Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Advances in Cryptology—CRYPTO '91, Springer-Verlag, pp156–171 [https://www.cs.technion.ac.il/~biham/Reports/Weizmann/cs91-18.ps.gz (gzipped PostScript)].
* Eli Biham and Adi Shamir, Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Advances in Cryptology – CRYPTO '91, Springer-Verlag, pp156–171 [https://www.cs.technion.ac.il/~biham/Reports/Weizmann/cs91-18.ps.gz (gzipped PostScript)].
* Ken Shirriff, Differential Cryptanalysis of REDOC-III, [http://www.righto.com/papers/redoc.ps (PS)]
* Ken Shirriff, Differential Cryptanalysis of REDOC-III, [http://www.righto.com/papers/redoc.ps (PS)]


Line 16: Line 16:


[[Category:Block ciphers]]
[[Category:Block ciphers]]



{{crypto-stub}}
{{crypto-stub}}

Latest revision as of 21:55, 5 March 2024

In cryptography, REDOC II and REDOC III are block ciphers designed by cryptographer Michael Wood for Cryptech Inc and are optimised for use in software. Both REDOC ciphers are patented.[1]

REDOC II (Cusick and Wood, 1990) operates on 80-bit blocks with a 160-bit key. The cipher has 10 rounds, and uses key-dependent S-boxes and masks used to select the tables for use in different rounds of the cipher. Cusick found an attack on one round, and Biham and Shamir (1991) used differential cryptanalysis to attack one round with 2300 encryptions. Biham and Shamir also found a way of recovering three masks for up to four rounds faster than exhaustive search. A prize of US$5,000 was offered for the best attack on one round of REDOC-II, and $20,000 for the best practical known-plaintext attack.

REDOC III is a more efficient cipher. It operates on an 80-bit block and accepts a variable-length key of up to 20,480 bits. The algorithm consists only of XORing key bytes with message bytes, and uses no permutations or substitutions. Ken Shirriff describes a differential attack on REDOC-III requiring 220 chosen plaintexts and 230 memory.

References

[edit]
  1. ^ Bruce Schneier Applied cryptography: protocols, algorithms, and source code in C 1996 "REDOC III REDOC HI is a streamlined version of REDOC n, also designed by Michael Wood [1615]. It operates on an 80-bit block. The key length is variable and can be as large as 2560 bytes (20,480 bits). "
  • Thomas W. Cusick and Michael C. Wood: The REDOC II Cryptosystem, CRYPTO 1990, pp545–563.
  • Eli Biham and Adi Shamir, Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Advances in Cryptology – CRYPTO '91, Springer-Verlag, pp156–171 (gzipped PostScript).
  • Ken Shirriff, Differential Cryptanalysis of REDOC-III, (PS)