3-Way
|
In cryptography, 3-Way is a block cipher designed in 1994 by Joan Daemen, who also (with Vincent Rijmen) designed Rijndael, the winner of NIST's Advanced Encryption Standard (AES) contest.
3-Way has a block size of 96 bits, notably not a power of two such as the more common 64 or 128 bits. The key length is also 96 bits. The figure 96 arises from the use of three 32 bit words in the algorithm, from which also is derived the cipher's name. When 3-Way was invented, 96-bit keys and blocks were quite strong, but more recent ciphers have a 128-bit block, and few now have keys shorter than 128 bits. 3-Way is an 11-round substitution-permutation network.
3-Way is designed to be very efficient in specialised hardware, and has some elegant mathematical features which enable nearly all the decryption to be done in exactly the same circuits as did the encryption.
3-Way is vulnerable to related key cryptanalysis; John Kelsey, Bruce Schneier and David Wagner show how it can be broken with one related key query and about <math>2^{22}<math> chosen plaintexts.
References
J. Daemen, R. Govaerts, J. Vandewalle, "A New Approach to Block Cipher Design," Fast Software Encryption 1994, Volume 809 of Lecture Notes in Computer Science, pp. 18–32.
External links
- SCAN's entry fror 3-Way (http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#3-Way)
- Chapter 7 of Daemen's thesis (http://www.esat.kuleuven.ac.be/~cosicart/ps/JD-9500/) (Gzipped Postscript)
Block ciphers edit (https://academickids.com:443/encyclopedia/index.php?title=Template:Block_ciphers&action=edit) |
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA |
Design: Feistel network | Key schedule | Product cipher | S-box | SPN Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL Standardisation: AES process | CRYPTREC | NESSIE Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key |