Abstract
In this paper, we propose a new symmetric key block cipher SC2000 with 128-bit block length and 128-,192-,256-bit key lengths. The block cipher is constructed by piling two layers: one is a Feistel structure layer and the other is an SPN structure layer. Each operation used in two layers is S-box or logical operation, which has been well studied about security. It is a strong feature of the cipher that the fast software implementations are available by using the techniques of putting together S-boxes in various ways and of the Bitslice implementation.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham, “A Fast New DES Implementation in Software,” Fast Software Encryption, 4th International Workshop Proceedings, Springer-Verlag LNCS 1267, 1997, pp. 260–272.
E. Biham, R. Anderson, and L. Knudsen, “Serpent: A New Block Cipher Proposal,” Fast Software Encryption, 5th International Workshop Proceedings, Springer-Verlag LNCS 1372, 1998, pp. 222–238.
B. Gladman, “Serpent S Boxes as Boolean Functions,” http://www.btinternet.com/~brian.gladman/cryptography_technology/serpent/index.html, 2000.
J. Daemen, L. Knudsen. V. Rijmen, “The Block Cipher Square,” FSE4, LNCS pp. 149–165, 1997.
J. Daemen, V. Rijmen, “AES Proposal: Rijndael,” NIST AES Proposal, Jun 1998.
Fujitsu, “CE71 Series,” DATA SHEET DS06-20108-1, http://edevice.fujitsu.com/fj/CATALOG/AD00/00-00001/10e-5b-2.html
M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki, K. Ohta “A strategy for constructing fast found functions with practical security agaist differential and linear cryptanalysis,” Selected Areas in Cryptography, SAC’98, LNCS 1556, pp. 264–279, 1998.
K. Nyberg and L.R. Knudsen, “Provable Security Against Differential Cryptanalysis,” Journal of Cryptology, v. 8, n. 1, 1995, pp. 27–37.
D.A. Osvik “Speeding up Serpent,” Proceedings of The Third AEC Conference, pp 317–329.
B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, “The Twofish Encryption Algorithm,” John Wiley and Sons, Inc. New York, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shimoyama, T. et al. (2002). The Block Cipher SC2000. In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_26
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive