1654:
1682:
114:
breaks 13 rounds with a complexity of 2 encryptions for the key size of length 128 bits (Tezcan, 2010). Similar attacks apply for 14 and 15 rounds of CLEFIA for the key sizes 192 and 256 bits, respectively.
1634:
1464:
1317:
1252:
333:
1743:
1079:
435:
1719:
1069:
563:
970:
1232:
1206:
1074:
1047:
293:
1310:
139:
systems. It is among the cryptographic techniques recommended candidate for
Japanese government use by CRYPTREC revision in 2013.
1216:
326:
1095:
135:, meaning "key". The block size is 128 bits and the key size can be 128 bit, 192 bit or 256 bit. It is intended to be used in
1513:
1273:
179:
1303:
363:
1748:
1629:
1584:
1397:
1159:
319:
1508:
1176:
1086:
1064:
377:
1712:
1624:
1181:
1037:
990:
465:
136:
72:
1614:
1604:
1459:
1247:
1129:
1004:
373:
1609:
1599:
1402:
1362:
1355:
1345:
1340:
1186:
975:
346:
1738:
1350:
1278:
1154:
1149:
1101:
950:
1657:
1503:
1449:
1268:
1091:
528:
1705:
1619:
1543:
1171:
1054:
980:
663:
643:
175:
153:
92:
203:
1382:
1134:
1111:
430:
283:
204:"Sony Develops "CLEFIA" - New Block Cipher Algorithm Based on State-of-the-art Design Technologies"
1488:
1472:
1419:
1119:
1027:
739:
668:
638:
583:
1548:
1538:
1409:
839:
538:
498:
493:
460:
420:
368:
1689:
1483:
1211:
1106:
985:
844:
724:
693:
387:
111:
1058:
1042:
1031:
965:
924:
889:
819:
799:
673:
553:
548:
503:
185:
85:
189:
1558:
1478:
1439:
1387:
1372:
1196:
1144:
955:
940:
879:
874:
759:
508:
1732:
1639:
1594:
1553:
1533:
1429:
1392:
1367:
1191:
1139:
1018:
1000:
789:
764:
754:
578:
568:
415:
103:
1589:
1434:
1424:
1414:
1377:
1326:
1124:
945:
909:
774:
653:
608:
440:
392:
342:
288:
124:
1568:
734:
729:
613:
178:. "The Improbable Differential Attack: Cryptanalysis of Reduced-Round CLEFIA".
1528:
1498:
1493:
1454:
1166:
884:
824:
708:
703:
648:
518:
381:
1518:
899:
894:
784:
698:
593:
573:
263:"The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA"
1681:
223:
1563:
1523:
1237:
1201:
995:
658:
533:
513:
425:
62:
49:
904:
854:
814:
804:
749:
744:
588:
397:
226:
Information security - Lightweight cryptography - Part 2: Block ciphers
1444:
1242:
864:
859:
794:
779:
769:
714:
688:
683:
678:
543:
298:
960:
919:
869:
849:
834:
623:
603:
523:
488:
262:
246:
289:
256bit
Ciphers - CLEFIA Reference implementation and derived code
809:
718:
633:
628:
618:
598:
470:
455:
128:
1299:
315:
914:
829:
450:
445:
247:"Improved Impossible Differential Cryptanalysis of CLEFIA"
299:
Implementation of 128-bit CLEFIA codec and hash function
1693:
1465:
Cryptographically secure pseudorandom number generator
303:
1577:
1333:
1261:
1225:
1014:
933:
479:
406:
354:
101:
91:
81:
71:
61:
56:
45:
37:
29:
24:
156:- Lightweight cryptography - Part 2: Block ciphers
147:CLEFIA is included in the following standards.
110:An improbable differential attack requiring 2
1713:
1311:
327:
8:
19:
245:Wao Wang; Xiaoyun Wang (12 December 2007).
131:. Its name is derived from the French word
1720:
1706:
1318:
1304:
1296:
334:
320:
312:
308:
304:
1688:This cryptography-related article is a
167:
18:
184:. Lecture Notes in Computer Science.
7:
1678:
1676:
1692:. You can help Knowledge (XXG) by
14:
1744:Digital rights management systems
261:Cihangir Tezcan (8 August 2010).
1680:
1653:
1652:
1514:Information-theoretic security
181:Proceedings of INDOCRYPT, 2010
1:
1630:Message authentication code
1585:Cryptographic hash function
1398:Cryptographic hash function
1765:
1675:
1509:Harvest now, decrypt later
1648:
1625:Post-quantum cryptography
1295:
1217:Time/memory/data tradeoff
311:
307:
109:
1615:Quantum key distribution
1605:Authenticated encryption
1460:Random number generation
1005:Whitening transformation
127:algorithm, developed by
1610:Public-key cryptography
1600:Symmetric-key algorithm
1403:Key derivation function
1363:Cryptographic primitive
1356:Authentication protocol
1346:Outline of cryptography
1341:History of cryptography
976:Confusion and diffusion
224:"ISO/IEC 29192-2:2019,
1351:Cryptographic protocol
294:Sony Introduces CLEFIA
151:ISO/IEC 29192-2:2019,
1504:End-to-end encryption
1450:Cryptojacking malware
1269:Initialization vector
67:128, 192, or 256 bits
1620:Quantum cryptography
1544:Trusted timestamping
1048:3-subset MITM attack
664:Intel Cascade Cipher
644:Hasty Pudding cipher
154:Information security
1383:Cryptographic nonce
1087:Differential-linear
21:
1749:Cryptography stubs
1489:Subliminal channel
1473:Pseudorandom noise
1420:Key (cryptography)
1160:Differential-fault
378:internal mechanics
1701:
1700:
1670:
1669:
1666:
1665:
1549:Key-based routing
1539:Trapdoor function
1410:Digital signature
1291:
1290:
1287:
1286:
1274:Mode of operation
951:Lai–Massey scheme
123:is a proprietary
118:
117:
112:chosen plaintexts
1756:
1722:
1715:
1708:
1684:
1677:
1656:
1655:
1484:Insecure channel
1320:
1313:
1306:
1297:
1145:Power-monitoring
986:Avalanche effect
694:Khufu and Khafre
347:security summary
336:
329:
322:
313:
309:
305:
273:
271:
269:
257:
255:
253:
232:
231:
220:
214:
213:
211:
210:
200:
194:
193:
188:. Archived from
176:Tezcan, Cihangir
172:
22:
1764:
1763:
1759:
1758:
1757:
1755:
1754:
1753:
1729:
1728:
1727:
1726:
1673:
1671:
1662:
1644:
1573:
1329:
1324:
1283:
1257:
1226:Standardization
1221:
1150:Electromagnetic
1102:Integral/Square
1059:Piling-up lemma
1043:Biclique attack
1032:EFF DES cracker
1016:
1010:
941:Feistel network
929:
554:CIPHERUNICORN-E
549:CIPHERUNICORN-A
481:
475:
408:
402:
356:
350:
340:
280:
267:
265:
260:
251:
249:
244:
241:
239:Further reading
236:
235:
222:
221:
217:
208:
206:
202:
201:
197:
186:Springer-Verlag
174:
173:
169:
164:
145:
143:Standardization
86:Feistel network
38:First published
17:
12:
11:
5:
1762:
1760:
1752:
1751:
1746:
1741:
1731:
1730:
1725:
1724:
1717:
1710:
1702:
1699:
1698:
1685:
1668:
1667:
1664:
1663:
1661:
1660:
1649:
1646:
1645:
1643:
1642:
1637:
1635:Random numbers
1632:
1627:
1622:
1617:
1612:
1607:
1602:
1597:
1592:
1587:
1581:
1579:
1575:
1574:
1572:
1571:
1566:
1561:
1559:Garlic routing
1556:
1551:
1546:
1541:
1536:
1531:
1526:
1521:
1516:
1511:
1506:
1501:
1496:
1491:
1486:
1481:
1479:Secure channel
1476:
1470:
1469:
1468:
1457:
1452:
1447:
1442:
1440:Key stretching
1437:
1432:
1427:
1422:
1417:
1412:
1407:
1406:
1405:
1400:
1390:
1388:Cryptovirology
1385:
1380:
1375:
1373:Cryptocurrency
1370:
1365:
1360:
1359:
1358:
1348:
1343:
1337:
1335:
1331:
1330:
1325:
1323:
1322:
1315:
1308:
1300:
1293:
1292:
1289:
1288:
1285:
1284:
1282:
1281:
1276:
1271:
1265:
1263:
1259:
1258:
1256:
1255:
1250:
1245:
1240:
1235:
1229:
1227:
1223:
1222:
1220:
1219:
1214:
1209:
1204:
1199:
1194:
1189:
1184:
1179:
1174:
1169:
1164:
1163:
1162:
1157:
1152:
1147:
1142:
1132:
1127:
1122:
1117:
1109:
1104:
1099:
1092:Distinguishing
1089:
1084:
1083:
1082:
1077:
1072:
1062:
1052:
1051:
1050:
1045:
1035:
1024:
1022:
1012:
1011:
1009:
1008:
998:
993:
988:
983:
978:
973:
968:
963:
958:
956:Product cipher
953:
948:
943:
937:
935:
931:
930:
928:
927:
922:
917:
912:
907:
902:
897:
892:
887:
882:
877:
872:
867:
862:
857:
852:
847:
842:
837:
832:
827:
822:
817:
812:
807:
802:
797:
792:
787:
782:
777:
772:
767:
762:
757:
752:
747:
742:
737:
732:
727:
722:
711:
706:
701:
696:
691:
686:
681:
676:
671:
666:
661:
656:
651:
646:
641:
636:
631:
626:
621:
616:
611:
606:
601:
596:
591:
586:
584:Cryptomeria/C2
581:
576:
571:
566:
561:
556:
551:
546:
541:
536:
531:
526:
521:
516:
511:
506:
501:
496:
491:
485:
483:
477:
476:
474:
473:
468:
463:
458:
453:
448:
443:
438:
433:
428:
423:
418:
412:
410:
404:
403:
401:
400:
395:
390:
385:
371:
366:
360:
358:
352:
351:
341:
339:
338:
331:
324:
316:
302:
301:
296:
291:
286:
284:CLEFIA website
279:
278:External links
276:
275:
274:
258:
240:
237:
234:
233:
215:
195:
192:on 2013-02-03.
166:
165:
163:
160:
159:
158:
144:
141:
116:
115:
107:
106:
99:
98:
95:
89:
88:
83:
79:
78:
75:
69:
68:
65:
59:
58:
54:
53:
47:
43:
42:
39:
35:
34:
31:
27:
26:
15:
13:
10:
9:
6:
4:
3:
2:
1761:
1750:
1747:
1745:
1742:
1740:
1739:Block ciphers
1737:
1736:
1734:
1723:
1718:
1716:
1711:
1709:
1704:
1703:
1697:
1695:
1691:
1686:
1683:
1679:
1674:
1659:
1651:
1650:
1647:
1641:
1640:Steganography
1638:
1636:
1633:
1631:
1628:
1626:
1623:
1621:
1618:
1616:
1613:
1611:
1608:
1606:
1603:
1601:
1598:
1596:
1595:Stream cipher
1593:
1591:
1588:
1586:
1583:
1582:
1580:
1576:
1570:
1567:
1565:
1562:
1560:
1557:
1555:
1554:Onion routing
1552:
1550:
1547:
1545:
1542:
1540:
1537:
1535:
1534:Shared secret
1532:
1530:
1527:
1525:
1522:
1520:
1517:
1515:
1512:
1510:
1507:
1505:
1502:
1500:
1497:
1495:
1492:
1490:
1487:
1485:
1482:
1480:
1477:
1474:
1471:
1466:
1463:
1462:
1461:
1458:
1456:
1453:
1451:
1448:
1446:
1443:
1441:
1438:
1436:
1433:
1431:
1430:Key generator
1428:
1426:
1423:
1421:
1418:
1416:
1413:
1411:
1408:
1404:
1401:
1399:
1396:
1395:
1394:
1393:Hash function
1391:
1389:
1386:
1384:
1381:
1379:
1376:
1374:
1371:
1369:
1368:Cryptanalysis
1366:
1364:
1361:
1357:
1354:
1353:
1352:
1349:
1347:
1344:
1342:
1339:
1338:
1336:
1332:
1328:
1321:
1316:
1314:
1309:
1307:
1302:
1301:
1298:
1294:
1280:
1277:
1275:
1272:
1270:
1267:
1266:
1264:
1260:
1254:
1251:
1249:
1246:
1244:
1241:
1239:
1236:
1234:
1231:
1230:
1228:
1224:
1218:
1215:
1213:
1210:
1208:
1205:
1203:
1200:
1198:
1195:
1193:
1190:
1188:
1185:
1183:
1180:
1178:
1175:
1173:
1172:Interpolation
1170:
1168:
1165:
1161:
1158:
1156:
1153:
1151:
1148:
1146:
1143:
1141:
1138:
1137:
1136:
1133:
1131:
1128:
1126:
1123:
1121:
1118:
1116:
1115:
1110:
1108:
1105:
1103:
1100:
1097:
1093:
1090:
1088:
1085:
1081:
1078:
1076:
1073:
1071:
1068:
1067:
1066:
1063:
1060:
1056:
1053:
1049:
1046:
1044:
1041:
1040:
1039:
1036:
1033:
1029:
1026:
1025:
1023:
1020:
1019:cryptanalysis
1013:
1006:
1002:
1001:Key whitening
999:
997:
994:
992:
989:
987:
984:
982:
979:
977:
974:
972:
969:
967:
964:
962:
959:
957:
954:
952:
949:
947:
944:
942:
939:
938:
936:
932:
926:
923:
921:
918:
916:
913:
911:
908:
906:
903:
901:
898:
896:
893:
891:
888:
886:
883:
881:
878:
876:
873:
871:
868:
866:
863:
861:
858:
856:
853:
851:
848:
846:
843:
841:
838:
836:
833:
831:
828:
826:
823:
821:
818:
816:
813:
811:
808:
806:
803:
801:
798:
796:
793:
791:
790:New Data Seal
788:
786:
783:
781:
778:
776:
773:
771:
768:
766:
763:
761:
758:
756:
753:
751:
748:
746:
743:
741:
738:
736:
733:
731:
728:
726:
723:
720:
716:
712:
710:
707:
705:
702:
700:
697:
695:
692:
690:
687:
685:
682:
680:
677:
675:
672:
670:
667:
665:
662:
660:
657:
655:
652:
650:
647:
645:
642:
640:
637:
635:
632:
630:
627:
625:
622:
620:
617:
615:
612:
610:
607:
605:
602:
600:
597:
595:
592:
590:
587:
585:
582:
580:
577:
575:
572:
570:
567:
565:
562:
560:
557:
555:
552:
550:
547:
545:
542:
540:
537:
535:
532:
530:
529:BEAR and LION
527:
525:
522:
520:
517:
515:
512:
510:
507:
505:
502:
500:
497:
495:
492:
490:
487:
486:
484:
478:
472:
469:
467:
464:
462:
459:
457:
454:
452:
449:
447:
444:
442:
439:
437:
434:
432:
429:
427:
424:
422:
419:
417:
414:
413:
411:
405:
399:
396:
394:
391:
389:
386:
383:
379:
375:
372:
370:
367:
365:
362:
361:
359:
353:
348:
344:
343:Block ciphers
337:
332:
330:
325:
323:
318:
317:
314:
310:
306:
300:
297:
295:
292:
290:
287:
285:
282:
281:
277:
264:
259:
248:
243:
242:
238:
229:
227:
219:
216:
205:
199:
196:
191:
187:
183:
182:
177:
171:
168:
161:
157:
155:
150:
149:
148:
142:
140:
138:
134:
130:
126:
122:
113:
108:
105:
104:cryptanalysis
100:
97:18, 22, or 26
96:
94:
90:
87:
84:
80:
76:
74:
70:
66:
64:
60:
57:Cipher detail
55:
51:
48:
46:Certification
44:
40:
36:
32:
28:
23:
1694:expanding it
1687:
1672:
1590:Block cipher
1435:Key schedule
1425:Key exchange
1415:Kleptography
1378:Cryptosystem
1327:Cryptography
1177:Partitioning
1135:Side-channel
1113:
1080:Higher-order
1065:Differential
946:Key schedule
558:
266:. Retrieved
250:. Retrieved
225:
218:
207:. Retrieved
198:
190:the original
180:
170:
152:
146:
132:
125:block cipher
120:
119:
102:Best public
16:Block cipher
1578:Mathematics
1569:Mix network
1262:Utilization
1248:NSA Suite B
1233:AES process
1182:Rubber-hose
1120:Related-key
1028:Brute-force
407:Less common
73:Block sizes
52:(Candidate)
1733:Categories
1529:Ciphertext
1499:Decryption
1494:Encryption
1455:Ransomware
1212:Chi-square
1130:Rotational
1070:Impossible
991:Block size
885:Spectr-H64
709:Ladder-DES
704:Kuznyechik
649:Hierocrypt
519:BassOmatic
482:algorithms
409:algorithms
382:Triple DES
357:algorithms
268:25 October
252:25 October
209:2007-03-26
162:References
1519:Plaintext
1187:Black-bag
1107:Boomerang
1096:Known-key
1075:Truncated
900:Threefish
895:SXAL/MBAL
785:MultiSwap
740:MacGuffin
699:KN-Cipher
639:Grand Cru
594:CS-Cipher
574:COCONUT98
82:Structure
63:Key sizes
30:Designers
1658:Category
1564:Kademlia
1524:Codetext
1467:(CSPRNG)
1238:CRYPTREC
1202:Weak key
1155:Acoustic
996:Key size
840:Red Pike
659:IDEA NXT
539:Chiasmus
534:CAST-256
514:BaseKing
499:Akelarre
494:Adiantum
461:Skipjack
426:CAST-128
421:Camellia
369:Blowfish
77:128 bits
50:CRYPTREC
1334:General
1279:Padding
1197:Rebound
905:Treyfer
855:SAVILLE
815:PRESENT
805:NOEKEON
750:MAGENTA
745:Madryga
725:Lucifer
589:CRYPTON
398:Twofish
388:Serpent
25:General
1445:Keygen
1243:NESSIE
1192:Davies
1140:Timing
1055:Linear
1015:Attack
934:Design
925:Zodiac
890:Square
865:SHACAL
860:SC2000
820:Prince
800:Nimbus
795:NewDES
780:MULTI2
770:MISTY1
713:LOKI (
689:KHAZAD
684:KeeLoq
679:KASUMI
674:Kalyna
559:CLEFIA
544:CIKS-1
504:Anubis
355:Common
121:CLEFIA
93:Rounds
20:CLEFIA
1475:(PRN)
1125:Slide
981:Round
966:P-box
961:S-box
920:XXTEA
880:Speck
875:Simon
870:SHARK
850:SAFER
835:REDOC
760:Mercy
719:89/91
669:Iraqi
634:G-DES
624:FEA-M
604:DES-X
569:Cobra
524:BATON
509:Ascon
489:3-Way
480:Other
1690:stub
1253:CNSA
1112:Mod
1038:MITM
810:NUSH
765:MESH
755:MARS
629:FROG
619:FEAL
599:DEAL
579:Crab
564:CMEA
471:XTEA
456:SEED
436:IDEA
431:GOST
416:ARIA
270:2010
254:2010
133:clef
129:Sony
41:2007
33:Sony
1207:Tau
1167:XSL
971:SPN
915:xmx
910:UES
845:S-1
830:RC2
775:MMB
654:ICE
609:DFC
466:TEA
451:RC6
446:RC5
441:LEA
393:SM4
374:DES
364:AES
137:DRM
1735::
735:M8
730:M6
717:,
715:97
614:E2
380:,
1721:e
1714:t
1707:v
1696:.
1319:e
1312:t
1305:v
1114:n
1098:)
1094:(
1061:)
1057:(
1034:)
1030:(
1021:)
1017:(
1007:)
1003:(
825:Q
721:)
384:)
376:(
349:)
345:(
335:e
328:t
321:v
272:.
256:.
230:.
228:"
212:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.