Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Key whitening

From Wikipedia, the free encyclopedia
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This articleneeds additional citations forverification. Please helpimprove this article byadding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Key whitening" – news ·newspapers ·books ·scholar ·JSTOR
(July 2020) (Learn how and when to remove this message)
This article includes alist of references,related reading, orexternal links,but its sources remain unclear because it lacksinline citations. Please helpimprove this article byintroducing more precise citations.(July 2020) (Learn how and when to remove this message)
(Learn how and when to remove this message)

Incryptography,key whitening is a technique intended to increase the security of aniterated block cipher. It consists of steps that combine the data with portions of thekey.

Details

[edit]
Key whitening using the xor-encrypt-xor technique: a (short) Key is made longer with Key1 and Key2 parts

The most common form of key whitening isxor–encrypt–xor – using a simpleXOR before the first round and after the last round ofencryption.

The first block cipher to use a form of key whitening isDES-X, which simply uses two extra 64-bit keys for whitening, beyond the normal 56-bit key ofDES. This is intended to increase the complexity of abrute-force attack, increasing the effective size of the key without major changes in the algorithm. DES-X's inventor,Ron Rivest, named the techniquewhitening.

The cipherFEAL (followed byKhufu and Khafre) introduced the practice of key whitening using portions of the same key used in the rest of the cipher. This offers no additional protection from brute-force attacks, but it can make other attacks more difficult. In aFeistel cipher or similar algorithm, key whitening can increase security by concealing the specific inputs to the first and last round functions. In particular, it is not susceptible to ameet-in-the-middle attack. This form of key whitening has been adopted as a feature of many later block ciphers, includingAES,MARS,RC6, andTwofish.

See also

[edit]

References

[edit]
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Key_whitening&oldid=1280883298"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp