BEAR and LION Cipher

BEAR and LION Cipher

The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipher and a cryptographic hash function. The algorithms use a very large variable block size, on the order of 213 to 223 bits or more. It is a 3 round generalized Feistel cipher, using the hash function twice with independent keys and the stream cipher once as round functions. The inventors proved that an attack that recovers the key would break both the stream cipher and the hash.

References

cite paper
author = Ross Anderson and Eli Biham
title = Two Practical and Provably Secure Block Ciphers: BEAR and LION
version =
publisher =
date =
url = http://www.cl.cam.ac.uk/~rja14/Papers/bear-lion.pdf
format = PDF
accessdate = 2007-01-13


Wikimedia Foundation. 2010.

Игры ⚽ Нужен реферат?

Look at other dictionaries:

  • Cipher security summary — This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity …   Wikipedia

  • Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… …   Wikipedia

  • Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key.[1][2] A block cipher by itself… …   Wikipedia

  • Cryptomeria cipher — The Feistel function of the Cryptomeria cipher. General Designers 4C Entity First published …   Wikipedia

  • DFC (cipher) — This article is about the block cipher. For other uses, see DFC (disambiguation). DFC General Designers Jacques Stern, Serge Vaudenay, et al. First published 1998 Related to COCONUT98 Cipher detail …   Wikipedia

  • Crab (cipher) — This article is about the block cipher. For other uses, see Crab (disambiguation). Crab General Designers Burt Kaliski, Matt Robshaw First published 1993 Derived from MD5 Related to SHACAL …   Wikipedia

  • Nimbus (cipher) — This article is about the block cipher. For other uses, see Nimbus (disambiguation). Nimbus General Designers Alexis Machado First published 2000 Cipher detail Key sizes 128 bits Block sizes …   Wikipedia

  • Mercy (cipher) — This article is about the block cipher. For other uses, see Mercy (disambiguation). Mercy General Designers Paul Crowley First published April 2000[1] Derived from WAKE …   Wikipedia

  • Colours, standards and guidons — In the age of line tactics, the unit colour was an important rallying point for the troop. In military organizations, the practice of carrying colours, standards or Guidons, both to act as a rallying point for troops and to mark the location of… …   Wikipedia

  • Signals intelligence by alliances, nations and industries — This article is a subset article under the main article SIGINT, which addresses the unifying conceptual and technical factors in this intelligence discipline. This article describes how the discipline is used by multinational alliances and… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”