Knowledge (XXG)

CLEFIA

Source đź“ť

1654: 1682: 114:
breaks 13 rounds with a complexity of 2 encryptions for the key size of length 128 bits (Tezcan, 2010). Similar attacks apply for 14 and 15 rounds of CLEFIA for the key sizes 192 and 256 bits, respectively.
1634: 1464: 1317: 1252: 333: 1743: 1079: 435: 1719: 1069: 563: 970: 1232: 1206: 1074: 1047: 293: 1310: 139:
systems. It is among the cryptographic techniques recommended candidate for Japanese government use by CRYPTREC revision in 2013.
1216: 326: 1095: 135:, meaning "key". The block size is 128 bits and the key size can be 128 bit, 192 bit or 256 bit. It is intended to be used in 1513: 1273: 179: 1303: 363: 1748: 1629: 1584: 1397: 1159: 319: 1508: 1176: 1086: 1064: 377: 1712: 1624: 1181: 1037: 990: 465: 136: 72: 1614: 1604: 1459: 1247: 1129: 1004: 373: 1609: 1599: 1402: 1362: 1355: 1345: 1340: 1186: 975: 346: 1738: 1350: 1278: 1154: 1149: 1101: 950: 1657: 1503: 1449: 1268: 1091: 528: 1705: 1619: 1543: 1171: 1054: 980: 663: 643: 175: 153: 92: 203: 1382: 1134: 1111: 430: 283: 204:"Sony Develops "CLEFIA" - New Block Cipher Algorithm Based on State-of-the-art Design Technologies" 1488: 1472: 1419: 1119: 1027: 739: 668: 638: 583: 1548: 1538: 1409: 839: 538: 498: 493: 460: 420: 368: 1689: 1483: 1211: 1106: 985: 844: 724: 693: 387: 111: 1058: 1042: 1031: 965: 924: 889: 819: 799: 673: 553: 548: 503: 185: 85: 189: 1558: 1478: 1439: 1387: 1372: 1196: 1144: 955: 940: 879: 874: 759: 508: 1732: 1639: 1594: 1553: 1533: 1429: 1392: 1367: 1191: 1139: 1018: 1000: 789: 764: 754: 578: 568: 415: 103: 1589: 1434: 1424: 1414: 1377: 1326: 1124: 945: 909: 774: 653: 608: 440: 392: 342: 288: 124: 1568: 734: 729: 613: 178:. "The Improbable Differential Attack: Cryptanalysis of Reduced-Round CLEFIA". 1528: 1498: 1493: 1454: 1166: 884: 824: 708: 703: 648: 518: 381: 1518: 899: 894: 784: 698: 593: 573: 263:"The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA" 1681: 223: 1563: 1523: 1237: 1201: 995: 658: 533: 513: 425: 62: 49: 904: 854: 814: 804: 749: 744: 588: 397: 226:
Information security - Lightweight cryptography - Part 2: Block ciphers
1444: 1242: 864: 859: 794: 779: 769: 714: 688: 683: 678: 543: 298: 960: 919: 869: 849: 834: 623: 603: 523: 488: 262: 246: 289:
256bit Ciphers - CLEFIA Reference implementation and derived code
809: 718: 633: 628: 618: 598: 470: 455: 128: 1299: 315: 914: 829: 450: 445: 247:"Improved Impossible Differential Cryptanalysis of CLEFIA" 299:
Implementation of 128-bit CLEFIA codec and hash function
1693: 1465:
Cryptographically secure pseudorandom number generator
303: 1577: 1333: 1261: 1225: 1014: 933: 479: 406: 354: 101: 91: 81: 71: 61: 56: 45: 37: 29: 24: 156:- Lightweight cryptography - Part 2: Block ciphers 147:CLEFIA is included in the following standards. 110:An improbable differential attack requiring 2 1713: 1311: 327: 8: 19: 245:Wao Wang; Xiaoyun Wang (12 December 2007). 131:. Its name is derived from the French word 1720: 1706: 1318: 1304: 1296: 334: 320: 312: 308: 304: 1688:This cryptography-related article is a 167: 18: 184:. Lecture Notes in Computer Science. 7: 1678: 1676: 1692:. You can help Knowledge (XXG) by 14: 1744:Digital rights management systems 261:Cihangir Tezcan (8 August 2010). 1680: 1653: 1652: 1514:Information-theoretic security 181:Proceedings of INDOCRYPT, 2010 1: 1630:Message authentication code 1585:Cryptographic hash function 1398:Cryptographic hash function 1765: 1675: 1509:Harvest now, decrypt later 1648: 1625:Post-quantum cryptography 1295: 1217:Time/memory/data tradeoff 311: 307: 109: 1615:Quantum key distribution 1605:Authenticated encryption 1460:Random number generation 1005:Whitening transformation 127:algorithm, developed by 1610:Public-key cryptography 1600:Symmetric-key algorithm 1403:Key derivation function 1363:Cryptographic primitive 1356:Authentication protocol 1346:Outline of cryptography 1341:History of cryptography 976:Confusion and diffusion 224:"ISO/IEC 29192-2:2019, 1351:Cryptographic protocol 294:Sony Introduces CLEFIA 151:ISO/IEC 29192-2:2019, 1504:End-to-end encryption 1450:Cryptojacking malware 1269:Initialization vector 67:128, 192, or 256 bits 1620:Quantum cryptography 1544:Trusted timestamping 1048:3-subset MITM attack 664:Intel Cascade Cipher 644:Hasty Pudding cipher 154:Information security 1383:Cryptographic nonce 1087:Differential-linear 21: 1749:Cryptography stubs 1489:Subliminal channel 1473:Pseudorandom noise 1420:Key (cryptography) 1160:Differential-fault 378:internal mechanics 1701: 1700: 1670: 1669: 1666: 1665: 1549:Key-based routing 1539:Trapdoor function 1410:Digital signature 1291: 1290: 1287: 1286: 1274:Mode of operation 951:Lai–Massey scheme 123:is a proprietary 118: 117: 112:chosen plaintexts 1756: 1722: 1715: 1708: 1684: 1677: 1656: 1655: 1484:Insecure channel 1320: 1313: 1306: 1297: 1145:Power-monitoring 986:Avalanche effect 694:Khufu and Khafre 347:security summary 336: 329: 322: 313: 309: 305: 273: 271: 269: 257: 255: 253: 232: 231: 220: 214: 213: 211: 210: 200: 194: 193: 188:. Archived from 176:Tezcan, Cihangir 172: 22: 1764: 1763: 1759: 1758: 1757: 1755: 1754: 1753: 1729: 1728: 1727: 1726: 1673: 1671: 1662: 1644: 1573: 1329: 1324: 1283: 1257: 1226:Standardization 1221: 1150:Electromagnetic 1102:Integral/Square 1059:Piling-up lemma 1043:Biclique attack 1032:EFF DES cracker 1016: 1010: 941:Feistel network 929: 554:CIPHERUNICORN-E 549:CIPHERUNICORN-A 481: 475: 408: 402: 356: 350: 340: 280: 267: 265: 260: 251: 249: 244: 241: 239:Further reading 236: 235: 222: 221: 217: 208: 206: 202: 201: 197: 186:Springer-Verlag 174: 173: 169: 164: 145: 143:Standardization 86:Feistel network 38:First published 17: 12: 11: 5: 1762: 1760: 1752: 1751: 1746: 1741: 1731: 1730: 1725: 1724: 1717: 1710: 1702: 1699: 1698: 1685: 1668: 1667: 1664: 1663: 1661: 1660: 1649: 1646: 1645: 1643: 1642: 1637: 1635:Random numbers 1632: 1627: 1622: 1617: 1612: 1607: 1602: 1597: 1592: 1587: 1581: 1579: 1575: 1574: 1572: 1571: 1566: 1561: 1559:Garlic routing 1556: 1551: 1546: 1541: 1536: 1531: 1526: 1521: 1516: 1511: 1506: 1501: 1496: 1491: 1486: 1481: 1479:Secure channel 1476: 1470: 1469: 1468: 1457: 1452: 1447: 1442: 1440:Key stretching 1437: 1432: 1427: 1422: 1417: 1412: 1407: 1406: 1405: 1400: 1390: 1388:Cryptovirology 1385: 1380: 1375: 1373:Cryptocurrency 1370: 1365: 1360: 1359: 1358: 1348: 1343: 1337: 1335: 1331: 1330: 1325: 1323: 1322: 1315: 1308: 1300: 1293: 1292: 1289: 1288: 1285: 1284: 1282: 1281: 1276: 1271: 1265: 1263: 1259: 1258: 1256: 1255: 1250: 1245: 1240: 1235: 1229: 1227: 1223: 1222: 1220: 1219: 1214: 1209: 1204: 1199: 1194: 1189: 1184: 1179: 1174: 1169: 1164: 1163: 1162: 1157: 1152: 1147: 1142: 1132: 1127: 1122: 1117: 1109: 1104: 1099: 1092:Distinguishing 1089: 1084: 1083: 1082: 1077: 1072: 1062: 1052: 1051: 1050: 1045: 1035: 1024: 1022: 1012: 1011: 1009: 1008: 998: 993: 988: 983: 978: 973: 968: 963: 958: 956:Product cipher 953: 948: 943: 937: 935: 931: 930: 928: 927: 922: 917: 912: 907: 902: 897: 892: 887: 882: 877: 872: 867: 862: 857: 852: 847: 842: 837: 832: 827: 822: 817: 812: 807: 802: 797: 792: 787: 782: 777: 772: 767: 762: 757: 752: 747: 742: 737: 732: 727: 722: 711: 706: 701: 696: 691: 686: 681: 676: 671: 666: 661: 656: 651: 646: 641: 636: 631: 626: 621: 616: 611: 606: 601: 596: 591: 586: 584:Cryptomeria/C2 581: 576: 571: 566: 561: 556: 551: 546: 541: 536: 531: 526: 521: 516: 511: 506: 501: 496: 491: 485: 483: 477: 476: 474: 473: 468: 463: 458: 453: 448: 443: 438: 433: 428: 423: 418: 412: 410: 404: 403: 401: 400: 395: 390: 385: 371: 366: 360: 358: 352: 351: 341: 339: 338: 331: 324: 316: 302: 301: 296: 291: 286: 284:CLEFIA website 279: 278:External links 276: 275: 274: 258: 240: 237: 234: 233: 215: 195: 192:on 2013-02-03. 166: 165: 163: 160: 159: 158: 144: 141: 116: 115: 107: 106: 99: 98: 95: 89: 88: 83: 79: 78: 75: 69: 68: 65: 59: 58: 54: 53: 47: 43: 42: 39: 35: 34: 31: 27: 26: 15: 13: 10: 9: 6: 4: 3: 2: 1761: 1750: 1747: 1745: 1742: 1740: 1739:Block ciphers 1737: 1736: 1734: 1723: 1718: 1716: 1711: 1709: 1704: 1703: 1697: 1695: 1691: 1686: 1683: 1679: 1674: 1659: 1651: 1650: 1647: 1641: 1640:Steganography 1638: 1636: 1633: 1631: 1628: 1626: 1623: 1621: 1618: 1616: 1613: 1611: 1608: 1606: 1603: 1601: 1598: 1596: 1595:Stream cipher 1593: 1591: 1588: 1586: 1583: 1582: 1580: 1576: 1570: 1567: 1565: 1562: 1560: 1557: 1555: 1554:Onion routing 1552: 1550: 1547: 1545: 1542: 1540: 1537: 1535: 1534:Shared secret 1532: 1530: 1527: 1525: 1522: 1520: 1517: 1515: 1512: 1510: 1507: 1505: 1502: 1500: 1497: 1495: 1492: 1490: 1487: 1485: 1482: 1480: 1477: 1474: 1471: 1466: 1463: 1462: 1461: 1458: 1456: 1453: 1451: 1448: 1446: 1443: 1441: 1438: 1436: 1433: 1431: 1430:Key generator 1428: 1426: 1423: 1421: 1418: 1416: 1413: 1411: 1408: 1404: 1401: 1399: 1396: 1395: 1394: 1393:Hash function 1391: 1389: 1386: 1384: 1381: 1379: 1376: 1374: 1371: 1369: 1368:Cryptanalysis 1366: 1364: 1361: 1357: 1354: 1353: 1352: 1349: 1347: 1344: 1342: 1339: 1338: 1336: 1332: 1328: 1321: 1316: 1314: 1309: 1307: 1302: 1301: 1298: 1294: 1280: 1277: 1275: 1272: 1270: 1267: 1266: 1264: 1260: 1254: 1251: 1249: 1246: 1244: 1241: 1239: 1236: 1234: 1231: 1230: 1228: 1224: 1218: 1215: 1213: 1210: 1208: 1205: 1203: 1200: 1198: 1195: 1193: 1190: 1188: 1185: 1183: 1180: 1178: 1175: 1173: 1172:Interpolation 1170: 1168: 1165: 1161: 1158: 1156: 1153: 1151: 1148: 1146: 1143: 1141: 1138: 1137: 1136: 1133: 1131: 1128: 1126: 1123: 1121: 1118: 1116: 1115: 1110: 1108: 1105: 1103: 1100: 1097: 1093: 1090: 1088: 1085: 1081: 1078: 1076: 1073: 1071: 1068: 1067: 1066: 1063: 1060: 1056: 1053: 1049: 1046: 1044: 1041: 1040: 1039: 1036: 1033: 1029: 1026: 1025: 1023: 1020: 1019:cryptanalysis 1013: 1006: 1002: 1001:Key whitening 999: 997: 994: 992: 989: 987: 984: 982: 979: 977: 974: 972: 969: 967: 964: 962: 959: 957: 954: 952: 949: 947: 944: 942: 939: 938: 936: 932: 926: 923: 921: 918: 916: 913: 911: 908: 906: 903: 901: 898: 896: 893: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 848: 846: 843: 841: 838: 836: 833: 831: 828: 826: 823: 821: 818: 816: 813: 811: 808: 806: 803: 801: 798: 796: 793: 791: 790:New Data Seal 788: 786: 783: 781: 778: 776: 773: 771: 768: 766: 763: 761: 758: 756: 753: 751: 748: 746: 743: 741: 738: 736: 733: 731: 728: 726: 723: 720: 716: 712: 710: 707: 705: 702: 700: 697: 695: 692: 690: 687: 685: 682: 680: 677: 675: 672: 670: 667: 665: 662: 660: 657: 655: 652: 650: 647: 645: 642: 640: 637: 635: 632: 630: 627: 625: 622: 620: 617: 615: 612: 610: 607: 605: 602: 600: 597: 595: 592: 590: 587: 585: 582: 580: 577: 575: 572: 570: 567: 565: 562: 560: 557: 555: 552: 550: 547: 545: 542: 540: 537: 535: 532: 530: 529:BEAR and LION 527: 525: 522: 520: 517: 515: 512: 510: 507: 505: 502: 500: 497: 495: 492: 490: 487: 486: 484: 478: 472: 469: 467: 464: 462: 459: 457: 454: 452: 449: 447: 444: 442: 439: 437: 434: 432: 429: 427: 424: 422: 419: 417: 414: 413: 411: 405: 399: 396: 394: 391: 389: 386: 383: 379: 375: 372: 370: 367: 365: 362: 361: 359: 353: 348: 344: 343:Block ciphers 337: 332: 330: 325: 323: 318: 317: 314: 310: 306: 300: 297: 295: 292: 290: 287: 285: 282: 281: 277: 264: 259: 248: 243: 242: 238: 229: 227: 219: 216: 205: 199: 196: 191: 187: 183: 182: 177: 171: 168: 161: 157: 155: 150: 149: 148: 142: 140: 138: 134: 130: 126: 122: 113: 108: 105: 104:cryptanalysis 100: 97:18, 22, or 26 96: 94: 90: 87: 84: 80: 76: 74: 70: 66: 64: 60: 57:Cipher detail 55: 51: 48: 46:Certification 44: 40: 36: 32: 28: 23: 1694:expanding it 1687: 1672: 1590:Block cipher 1435:Key schedule 1425:Key exchange 1415:Kleptography 1378:Cryptosystem 1327:Cryptography 1177:Partitioning 1135:Side-channel 1113: 1080:Higher-order 1065:Differential 946:Key schedule 558: 266:. Retrieved 250:. Retrieved 225: 218: 207:. Retrieved 198: 190:the original 180: 170: 152: 146: 132: 125:block cipher 120: 119: 102:Best public 16:Block cipher 1578:Mathematics 1569:Mix network 1262:Utilization 1248:NSA Suite B 1233:AES process 1182:Rubber-hose 1120:Related-key 1028:Brute-force 407:Less common 73:Block sizes 52:(Candidate) 1733:Categories 1529:Ciphertext 1499:Decryption 1494:Encryption 1455:Ransomware 1212:Chi-square 1130:Rotational 1070:Impossible 991:Block size 885:Spectr-H64 709:Ladder-DES 704:Kuznyechik 649:Hierocrypt 519:BassOmatic 482:algorithms 409:algorithms 382:Triple DES 357:algorithms 268:25 October 252:25 October 209:2007-03-26 162:References 1519:Plaintext 1187:Black-bag 1107:Boomerang 1096:Known-key 1075:Truncated 900:Threefish 895:SXAL/MBAL 785:MultiSwap 740:MacGuffin 699:KN-Cipher 639:Grand Cru 594:CS-Cipher 574:COCONUT98 82:Structure 63:Key sizes 30:Designers 1658:Category 1564:Kademlia 1524:Codetext 1467:(CSPRNG) 1238:CRYPTREC 1202:Weak key 1155:Acoustic 996:Key size 840:Red Pike 659:IDEA NXT 539:Chiasmus 534:CAST-256 514:BaseKing 499:Akelarre 494:Adiantum 461:Skipjack 426:CAST-128 421:Camellia 369:Blowfish 77:128 bits 50:CRYPTREC 1334:General 1279:Padding 1197:Rebound 905:Treyfer 855:SAVILLE 815:PRESENT 805:NOEKEON 750:MAGENTA 745:Madryga 725:Lucifer 589:CRYPTON 398:Twofish 388:Serpent 25:General 1445:Keygen 1243:NESSIE 1192:Davies 1140:Timing 1055:Linear 1015:Attack 934:Design 925:Zodiac 890:Square 865:SHACAL 860:SC2000 820:Prince 800:Nimbus 795:NewDES 780:MULTI2 770:MISTY1 713:LOKI ( 689:KHAZAD 684:KeeLoq 679:KASUMI 674:Kalyna 559:CLEFIA 544:CIKS-1 504:Anubis 355:Common 121:CLEFIA 93:Rounds 20:CLEFIA 1475:(PRN) 1125:Slide 981:Round 966:P-box 961:S-box 920:XXTEA 880:Speck 875:Simon 870:SHARK 850:SAFER 835:REDOC 760:Mercy 719:89/91 669:Iraqi 634:G-DES 624:FEA-M 604:DES-X 569:Cobra 524:BATON 509:Ascon 489:3-Way 480:Other 1690:stub 1253:CNSA 1112:Mod 1038:MITM 810:NUSH 765:MESH 755:MARS 629:FROG 619:FEAL 599:DEAL 579:Crab 564:CMEA 471:XTEA 456:SEED 436:IDEA 431:GOST 416:ARIA 270:2010 254:2010 133:clef 129:Sony 41:2007 33:Sony 1207:Tau 1167:XSL 971:SPN 915:xmx 910:UES 845:S-1 830:RC2 775:MMB 654:ICE 609:DFC 466:TEA 451:RC6 446:RC5 441:LEA 393:SM4 374:DES 364:AES 137:DRM 1735:: 735:M8 730:M6 717:, 715:97 614:E2 380:, 1721:e 1714:t 1707:v 1696:. 1319:e 1312:t 1305:v 1114:n 1098:) 1094:( 1061:) 1057:( 1034:) 1030:( 1021:) 1017:( 1007:) 1003:( 825:Q 721:) 384:) 376:( 349:) 345:( 335:e 328:t 321:v 272:. 256:. 230:. 228:" 212:.

Index

CRYPTREC
Key sizes
Block sizes
Feistel network
Rounds
cryptanalysis
chosen plaintexts
block cipher
Sony
DRM
Information security
Tezcan, Cihangir
Proceedings of INDOCRYPT, 2010
Springer-Verlag
the original
"Sony Develops "CLEFIA" - New Block Cipher Algorithm Based on State-of-the-art Design Technologies"
"ISO/IEC 29192-2:2019, Information security - Lightweight cryptography - Part 2: Block ciphers"
"Improved Impossible Differential Cryptanalysis of CLEFIA"
"The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA"
CLEFIA website
256bit Ciphers - CLEFIA Reference implementation and derived code
Sony Introduces CLEFIA
Implementation of 128-bit CLEFIA codec and hash function
v
t
e
Block ciphers
security summary
AES
Blowfish

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑