Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

xmx

From Wikipedia, the free encyclopedia
Block cipher
For other uses, seeXMX (disambiguation).
xmx
General
DesignersDavid M'Raïhi,David Naccache,Jacques Stern,Serge Vaudenay
First publishedJanuary 1997
Cipher detail
Key sizesvariable, equal to block size
Block sizesvariable
Roundsvariable, even
Best publiccryptanalysis
differential cryptanalysis, complementation property,weak keys

Incryptography,xmx is ablock cipher designed in 1997 by DavidM'Raïhi,David Naccache,Jacques Stern, andSerge Vaudenay. According to thedesigners it "usespublic-key-like operations asconfusion and diffusion means." Thecipher was designed for efficiency, and the only operations it uses areXORsandmodular multiplications.

The main parameters of xmx are variable, including theblock size andkey size, which are equal, as wellas the number of rounds. In addition to thekey, it also makesuse of an odd modulusn which is small enough to fit in a single block.

The round function is f(m)=(moa)·b mod n, where a and b aresubkeys and b iscoprime to n. Here moa represents an operation thatequals m XOR a, if that is less than n, and otherwise equals m. This is a simpleinvertible operation: moaoa = m. The xmx cipher consistsof an even number of iterations of the round function, followed by a finalowith an additional subkey.

Thekey schedule is very simple, using the same key for all the multipliers, andthree different subkeys for the others: the key itself for the first half of thecipher, itsmultiplicative inverse mod n for the last half, and the XOR of these twofor the middle subkey.

The designers defined four specific variants of xmx:

  • Standard: 512-bit block size, 8 rounds, n=2512-1
  • High security: 768-bit block size, 12 rounds, n=2768-1
  • Very-high security: 1024-bit block size, 16 rounds, n=21024-1
  • Challenge: 256-bit block size, 8 rounds, n=(280-1)·2176+157

Borisov, et al., using a multiplicative form ofdifferential cryptanalysis, found acomplementation property for any variant of xmx, like the first three above, such thatn=2k-1, where k is the block size. They also found largeweak key classesfor the Challenge variant, and for many other moduli.

References

[edit]
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Xmx&oldid=1300172430"
Category:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp