MISTY1
|
In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. Two related designs are MISTY2 and KASUMI; the latter has recently been adopted as the standard encryption algorithm for European mobile phones. MISTY1 is one of the selected algorithms in the European NESSIE project, and has been recommended for Japanese government use by the CRYPTREC project.
"MISTY" can stand for "Mitsubishi Improved Security Technology", it is also the initials of the researchers involved in its development: Matsui Mitsuru, Ichikawa Tetsuya, Sorimachi Jun, Tokita Toshio, and Yamagishi Atsuhiro [1] (http://global.mitsubishielectric.com/misty/about/road.html).
MISTY1 is a Feistel network with a variable number of rounds (any multiple of 4), though 8 are recommended. The cipher operates on 64-bit blocks and has a key size of 128 bits. MISTY1 has an innovative recursive structure.
MISTY1 is provably secure against linear and differential cryptanalysis.
MISTY1 is covered by patents, although the algorithm is freely available for academic (non-profit) use. RFC2994 (http://www.faqs.org/rfcs/rfc2994.html).
References
- M. Matsui. Block encryption algorithm MISTY. In Fast Software Encryption, 4th International Workshop, FSE '97, LNCS 1267, pages 64–74. Springer, 1997.
- Mitsuru Matsui. "Block encryption algorithm MISTY." Technical report of IEICE ISEC96-11 (1996-07). (In Japanese).
External links
- MISTY homepage (http://www.security.melco.co.jp/SecWWW/MISTY/MISTY.htm)
- RFC 2994 (http://www.faqs.org/rfcs/rfc2994.html)
- John Savard's description of MISTY (http://home.ecn.ab.ca/~jsavard/crypto/co040308.htm)
- SCAN's entry on MISTY1 (http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#MISTY1)
Block ciphers edit (https://academickids.com:443/encyclopedia/index.php?title=Template:Block_ciphers&action=edit) |
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA |
Design: Feistel network | Key schedule | Product cipher | S-box | SPN Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL Standardisation: AES process | CRYPTREC | NESSIE Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key |