KHAZAD
General | |
---|---|
Designers | Vincent Rijmen and Paulo S. L. M. Barreto |
First published | 2000 |
Derived from | SHARK |
Cipher detail | |
Key sizes | 128 bits |
Block sizes | 64 bits |
Structure | Substitution–permutation network |
Rounds | 8 |
Best public cryptanalysis | |
No attack better than on the first five rounds is known. |
In
Khazad). KHAZAD was presented at the first NESSIE
workshop in 2000, and, after some small changes, was selected as a finalist in the project.
KHAZAD has an eight-round
decryption
.
The authors have stated that, "KHAZAD is not (and will never be) patented. It may be used free of charge for any purpose."
Frédéric Muller has discovered an attack which can break five of KHAZAD's eight rounds. No attacks better than this are known as of August 2009.
References
- P. Barreto, V. Rijmen (13–14 November 2000). The Khazad legacy-level block cipher. First open NESSIE Workshop. Leuven. p. 15. Retrieved 2013-01-14.
- CiteSeerX 10.1.1.90.5426.
- Frédéric Muller (December 2003). A New Attack against Khazad. Advances in Cryptology – CiteSeerX 10.1.1.108.7998.
External links
- Paulo S. L. M. Barreto (2008-11-19). "The KHAZAD Block Cipher". Archived from the original on 2017-10-11.