MAGENTA
|
In cryptography, MAGENTA is a symmetric key block cipher developed by Deutsche Telekom. The name MAGENTA is an acronym for Multifunctional Algorithm for General-purpose Encryption and Network Telecommunication Applications. (The color magenta is also part of the corporate identity of Deutsche Telekom.) The cipher was submitted to the Advanced Encryption Standard process, but did not advance beyond the first round; cryptographic weaknesses were discovered and it was found to be one of the slower ciphers submitted [1] (http://csrc.nist.gov/CryptoToolkit/aes/round1/testvals/).
MAGENTA has a block size of 128 bits and key sizes of 128, 192 and 256 bits. It is a Feistel cipher with six rounds.
After the presentation of the cipher at the first AES conference, several cryptographers immediately found vulnerabilities [2] (http://groups.google.com/groups?selm=6rj4sf%24f8p%241%40nnrp1.dejanews.com). These were written up and presented at the second AES conference (Biham et al, 1999).
References
- Eli Biham, Alex Biryukov, Niels Ferguson, Lars Knudsen, Bruce Schneier and Adi Shamir, "Cryptanalysis of Magenta", Second AES candidate conference, April 1999 (PDF) (http://www.schneier.com/paper-magenta.pdf).
External links
- John Savard's description of Magenta (http://home.ecn.ab.ca/~jsavard/crypto/co040411.htm)
- SCAN's entry for the cipher (http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#MAGENTA)
- Paper describing Magenta (http://www.gel.ulaval.ca/~klein/maitrise/aes/magenta.pdf)
Block ciphers edit (https://academickids.com:443/encyclopedia/index.php?title=Template:Block_ciphers&action=edit) |
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA |
Design: Feistel network | Key schedule | Product cipher | S-box | SPN Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL Standardisation: AES process | CRYPTREC | NESSIE Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key |