Abstract
This paper explores the question of how fast modern block ciphers can be realized as machine-independent Java implementations. The ciphers we considered include well-known proven ones such as DES and IDEA and recent candidates for the proposed DES-successor AES.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Adams, C.: RFC2144, The CAST-128 Encryption Algorithm (May 1997)
Adams, C.: Constructing Symmetric Ciphers Using the CAST Design Procedure. Designs, Codes and Cryptography 12(3), 71–104 (1997)
Biham, E., Anderson, R., Knudsen, L.: Serpent: A New Blockcipher Proposal, AES submission (1998), http://www.cl.cam.ac.uk/~rja14/serpent.html
Brown, L.: Design of LOKI97, draft AES submission (1998)
Brown, L., Pieprzyk, J., Seberry, J.: Improving Resistance to Differential Cryptoanalysis and the Redesign of LOKI. In: Advances in Cryptology – ASIACRYPT 1991 Proceedings. LNCS, pp. 36–50. Springer, Heidelberg (1993)
Daemenen, J., Knudsen, L., Rijmen, V.: The Block Cipher Square. In: Fast Software Encryption, 4th International Workshop Proccedings. LNCS, pp. 149–165. Springer, Heidelberg (1997)
Blaze, M., Diffie, W., Rivest, R., Schneier, B., Shimomura, T., Thompson, E., Wiener, M.: Minimal Key Lengths for Symmetric Ciphers to Provide Adequate Commercial Security, a report by an ad hoc group of cryptographers and computer scientists (January 1996)
Cryptix - Cryptografic Extensions for Java (1997), http://www.systemics.com/software/cryptix-java/
RSA–Challenge 1997 (1997), http://www.rsa.com/des/
National Bureau of Standards, NBS FIPS PUB 46, Data Encryption Standard (January 1977)
Geyer, W., Weis, R.: A Secure, Accountable, and Collaborative Whiteboard. In: Plagemann, T., Goebel, V. (eds.) IDMS 1998. LNCS, vol. 1983, p. 3. Springer, Heidelberg (1998)
Kilian, J., Rogaway, P.: How to protect DES against exhaustive key search. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 252–267. Springer, Heidelberg (1996)
Knudsen, L.: Cryptoanalysis of LOKI. In: Matsumoto, T., Imai, H., Rivest, R.L. (eds.) ASIACRYPT 1991. LNCS, vol. 739, pp. 22–35. Springer, Heidelberg (1993)
Knudsen, L.: Cryptoanalysis of LOKI91. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 196–208. Springer, Heidelberg (1993)
Knudsen, L.: A Key–Schedule Weakness in SAFER K-64. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 274–286. Springer, Heidelberg (1995)
Knudsen, L.: DEAL: A 128-bit Block Cipher, http://www.ii.uib.no/~larsr/newblock.html
Knudsen, L., Rijmen, V., Rivest, R., Robshaw, M.: On Design and Security of RC2. In: Fast Software Encryption, 5th International Workshop Proceedings. LNCS, pp. 206–221. Springer, Heidelberg (1998)
Lai, X.: Markov Ciphers and Differential Cryptoanalyis. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 17–38. Springer, Heidelberg (1991)
Lai, X.: On the Design and Security of Blockciphers. ETH Series in Information Processing, vol. 1. Hartmut–Gorre–Verlag, Konstanz (1992)
Lucks, S.: Attacking Triple Encryption. In: Vaudenay, S. (ed.) Proc. Fast Software Encryption 5. LNCS. Springer, Heidelberg (1998)
Lucks, S.: On the Security of the 128-bit Block Cipher DEAL, Universtität Mannheim, Fakultät fĂ¼r Mathematik und Informatik (1998), http://th.informatik.uni-mannheim.de/m/lucks/papers/deal.ps.gz
Massey, L.J.: SAFER K-64: A Byte-Orientated Blockciphering Algorithm. In: Fast Software Encryption, Cambridge Security Workshop Proceedings. LNCS, pp. 1–17. Springer, Heidelberg (1994)
Callas, J., Donnerhacke, L., Finnley, H.: OP Formats - OpenPGP Message Format. Internet Draft (November 1997)
Rivest, R.: RFC 1321. MD5 Message Digest Algorithm (April 1992)
Rijmen, V., Knudsen, L.: Weaknesses in LOKI97, ftp://ftp.esat.kuleuven.ac.be/pub/COSIC/rijmen/loki97.ps.gz
Rivest, R.: A Description of the RC2(r) Encryption Algorithm, Internet–Draft (June 1997) (working in progress)
Roe, M.: Performance of Symmetric Ciphers and One–way Hash Functions. In: Fast Software Encryption, Cambridge Security Workshop Proceedings. LNCS, pp. 83–86. Springer, Heidelberg (1994)
Roe, M.: Performance of Block Ciphers and Hash Functions – One Year later. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 359–362. Springer, Heidelberg (1994)
Rogaway, P.: The Security of DESX. In: CryptoBytes, RSA Laboratories, Redwood City, CA, USA, vol. 2(2) (Summer 1996)
RSA inc., http://www.rsa.com/rsa/products/jsafe , or outside USA, http://www.rsa.com/rsa/products/jsafe
Schneier, B.: Description of a New Variable-Length Key, 64-Bit Block Cipher. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)
Schneier, B.: Applied Cryptography Second Edition. John Wiley & Sons, New York (1996)
Schneier, B., Whiting, D.: Fast Software Encryption: Designing Encryption for Optimal Speed on the Intel Pentium Processor. In: Fast Software Encryption, 4th International Workshop Proceedings. LNCS, pp. 242–259. Springer, Heidelberg (1997)
Simpson, W.A., Baldwin, R.: The ESP DES-XEX3-CBC Transform. Internet–Draft (July 1997)
Java Security, November 19 (1997), http://www.javasoft.com/security/
Wiewall, E.: Secure Your applications with the Microsoft CryptoAPI. Microsoft Developer Network News, 5/96,3/4, 1 (1996)
Weis, R.: Modern Blockciphers (in German), In: Kryptographie. Weka–Fachzeitschriften–Verlag, Poing (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Weis, R., Lucks, S. (2000). The Performance of Modern Block Ciphers in JAVA. In: Quisquater, JJ., Schneier, B. (eds) Smart Card Research and Applications. CARDIS 1998. Lecture Notes in Computer Science, vol 1820. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10721064_10
Download citation
DOI: https://doi.org/10.1007/10721064_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67923-3
Online ISBN: 978-3-540-44534-0
eBook Packages: Springer Book Archive