SHARK
|
In cryptography, SHARK is a block cipher identified as one of the predecessors of Rijndael (the Advanced Encryption Standard).
SHARK has a 64-bit block size and a 128-bit key size. It is a six round SPN network which alternates a key mixing stage with linear and non-linear transformation layers. The linear transformation is derived from an error correcting code (a Reed-Solomon code) in order to guarantee good diffusion. The nonlinear layer is composed of eight 8-bit S-boxes based on the function F(x) = x-1 over GF(28).
Five rounds of a modified version of SHARK can be broken using a interpolation attack (Jakobsen and Knudsen, 1997).
See also
References
- Joan Daemen, Vincent Rijmen: The Design of Rijndael: AES - The Advanced Encryption Standard. Springer 2002, ISBN 3540425802.
- Thomas Jakobsen, Lars R. Knudsen: The Interpolation Attack on Block Ciphers. Fast Software Encryption 1997: 28–40
- Vincent Rijmen, Joan Daemen, Bart Preneel, Anton Bossalaers, Erik De Win: The Cipher SHARK. Fast Software Encryption 1996: 99–111
External links
- SCAN's entry for SHARK (http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#SHARK-A)
Block ciphers edit (https://academickids.com:443/encyclopedia/index.php?title=Template:Block_ciphers&action=edit) |
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA |
Design: Feistel network | Key schedule | Product cipher | S-box | SPN Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL Standardisation: AES process | CRYPTREC | NESSIE Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key |