This articlerelies excessively onreferences toprimary sources. Please improve this article by addingsecondary or tertiary sources. Find sources: "Iraqi block cipher" – news ·newspapers ·books ·scholar ·JSTOR(August 2008) (Learn how and when to remove this message) |
Incryptography, theIraqi block cipher was ablock cipher published inCsource code form byanonymous FTP upload around July 1999, and widely distributed onUsenet. It is a five roundunbalanced Feistel cipher operating on a256 bit block with a160 bit key.
The source code shows that the algorithm operates on blocks of 32 bytes (or 256 bits). That's four times larger than DES or 3DES (8 bytes) and twice as big as Twofish or AES (16 bytes). It also shows that the key size can vary from 160 to 2048 bits.
A detailed analysis of the source code of the algorithm shows that it uses a 256-byte S-Box that is key-dependant (as on Blowfish, it uses a first fixed S table that will generate, with the key, the second S-Box used for encryption/decryption). The algorithm also uses a 16-column x 16-row P-Box, which is also key-dependent and also initialized from a fixed P table. Each round uses one row from P-Box and 16 columns, which means that the algorithm can use up to 16 rounds.
Acomment suggests that it is ofIraqi origin. However, like theS-1 block cipher, it is generally regarded as ahoax, although of lesser quality than S-1. Although the comment suggests that it is Iraqi in origin, all comments, variable and function names and printedstrings are in English rather than Arabic; the code is fairly inefficient (including some pointless operations), and the cipher's security may be flawed (no proof).
Because it has a constantkey schedule the cipher is vulnerable to aslide attack. However, it may take 264 chosen texts to create a single slid pair, which would make the attack unfeasible. It also has manyfixed points, although that is not necessarily a problem, except possibly for hashing modes. No public attack is currently available. As with S-1, it wasDavid Wagner who first spotted the security flaws.[1]