Abstract
In this paper, we propose a 128-bit block cipher ARIA which is an involution substitution and permutation encryption network(SPN). We use the same S-boxes as Rijndael to eliminate defects which are caused by a totally involution structure. In the diffusion layer of ARIA, a 16× 16 binary matrix of the maximum branch number 8 is used to avoid some attacks well applied to the reduced round of Rijndael. ARIA uses only basic operations, S-box substitutions and XOR’s together with an involution structure so that it can be efficiently implemented on various platforms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2001)
NIST, NIST announces that Rijndael has been selected as the proposed AES, October 2 (2000), Available at http://csrc.nist.gov/CryptoToolkit/aes/
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J., Tokita, T.: Camellia: A 128-bit block cipher suitable for multiple platforms - design and analysis. In: Stinson, D.R., Tavares, S. (eds.) SAC 2000. LNCS, vol. 2012, pp. 39–56. Springer, Heidelberg (2001)
Matsui, M.: Block Encryption Algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 54–68. Springer, Heidelberg (1997)
Handschuh, H., Naccache, D.: SHACAL. In: Proceedings of the First Open NESSIE Workshop (November 2000)
Barreto, P.S.L.M., Rijmen, V.: The Khazad legacy-level block cipher. Primitive submitted to NESSIE (September 2000)
Barreto, P.S.L.M., Rijmen, V.: The Anubis block cipher. Primitive submitted to NESSIE (September 2000)
NESSIE Project, New European Schemes for Signatures, Integrity and Encryption, Homepage-avaiable at http://cryptonessie.org
Biryukov, A.: Analysis of Involutional Ciphers: Khazad and Anubis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 45–53. Springer, Heidelberg (2003)
Gilbert, H., Minier, M.: A collision attack on seven rounds of Rijndael. In: Proceeding of the third AES conference, pp. 230–241. NIST (2000)
Ferguson, N., Kesley, J., Lucks, S., Schneier, B., Stay, M., Wagner, D., Whiting, F.: Improved Cryptanalysis of Rijndael. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 213–230. Springer, Heidelberg (2001)
Koo, B., Jang, H., Song, J.: Constructing and Cryptanalysis of a 16x16 Binary Matrix as a Diffusion Layer. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol. 2908, pp. 489–503. Springer, Heidelberg (2004)
Wagner, D.: The boomerang attack. In: Knudsen, L.R. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156–169. Springer, Heidelberg (1999)
Jakobsen, T., Knudsen, L.R.: The interpolation attack on block ciphers. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 28–40. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, D. et al. (2004). New Block Cipher: ARIA. In: Lim, JI., Lee, DH. (eds) Information Security and Cryptology - ICISC 2003. ICISC 2003. Lecture Notes in Computer Science, vol 2971. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24691-6_32
Download citation
DOI: https://doi.org/10.1007/978-3-540-24691-6_32
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21376-5
Online ISBN: 978-3-540-24691-6
eBook Packages: Springer Book Archive