Xmx (original) (raw)

About DBpedia

In cryptography, xmx is a block cipher designed in 1997 by DavidM'Raïhi, David Naccache, Jacques Stern, and Serge Vaudenay. According to thedesigners it "uses public-key-like operations as confusion and diffusion means." Thecipher was designed for efficiency, and the only operations it uses are XORsand modular multiplications. The main parameters of xmx are variable, including theblock size and key size, which are equal, as wellas the number of rounds. In addition to the key, it also makesuse of an odd modulus n which is small enough to fit in a single block.

Property Value
dbo:abstract In cryptography, xmx is a block cipher designed in 1997 by DavidM'Raïhi, David Naccache, Jacques Stern, and Serge Vaudenay. According to thedesigners it "uses public-key-like operations as confusion and diffusion means." Thecipher was designed for efficiency, and the only operations it uses are XORsand modular multiplications. The main parameters of xmx are variable, including theblock size and key size, which are equal, as wellas the number of rounds. In addition to the key, it also makesuse of an odd modulus n which is small enough to fit in a single block. The round function is f(m)=(moa)·b mod n, where a and b aresubkeys and b is coprime to n. Here moa represents an operation thatequals m XOR a, if that is less than n, and otherwise equals m. This is a simpleinvertible operation: moaoa = m. The xmx cipher consistsof an even number of iterations of the round function, followed by a final owith an additional subkey. The key schedule is very simple, using the same key for all the multipliers, andthree different subkeys for the others: the key itself for the first half of thecipher, its multiplicative inverse mod n for the last half, and the XOR of these twofor the middle subkey. The designers defined four specific variants of xmx: * Standard: 512-bit block size, 8 rounds, n=2512-1 * High security: 768-bit block size, 12 rounds, n=2768-1 * Very-high security: 1024-bit block size, 16 rounds, n=21024-1 * Challenge: 256-bit block size, 8 rounds, n=(280-1)·2176+157 Borisov, et al., using a multiplicative form of differential cryptanalysis, found acomplementation property for any variant of xmx, like the first three above, such thatn=2k-1, where k is the block size. They also found large weak key classesfor the Challenge variant, and for many other moduli. (en)
dbo:wikiPageExternalLink http://citeseer.ist.psu.edu/672650.html http://citeseer.ist.psu.edu/19207.html
dbo:wikiPageID 9127817 (xsd:integer)
dbo:wikiPageLength 3762 (xsd:nonNegativeInteger)
dbo:wikiPageRevisionID 1084904573 (xsd:integer)
dbo:wikiPageWikiLink dbr:David_A._Wagner dbr:David_Naccache dbr:Multiplicative_inverse dbr:Cryptography dbr:Weak_key dbr:Modular_arithmetic dbr:Confusion_and_diffusion dbr:Leuven dbr:Key_(cryptography) dbr:Key_schedule dbr:Key_size dbr:Public-key_cryptography dbr:PDF dbr:Differential_cryptanalysis dbr:Fast_Software_Encryption dbr:Haifa dbr:Jacques_Stern dbr:Serge_Vaudenay dbc:Block_ciphers dbr:Block_cipher dbr:Block_size_(cryptography) dbr:PostScript dbr:Coprime dbr:Nikita_Borisov dbr:Springer-Verlag dbr:XOR
dbp:blockSize variable (en)
dbp:cryptanalysis differential cryptanalysis, complementation property, weak keys (en)
dbp:designers David M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay (en)
dbp:keySize variable, equal to block size (en)
dbp:name xmx (en)
dbp:publishDate January 1997 (en)
dbp:rounds variable, even (en)
dbp:wikiPageUsesTemplate dbt:Cite_conference dbt:Other_uses dbt:Short_description dbt:Cryptography_navbox dbt:Crypto-stub dbt:Infobox_block_cipher dbt:Lowercase
dcterms:subject dbc:Block_ciphers
gold:hypernym dbr:Cipher
rdf:type yago:WikicatBlockCiphers dbo:Noble yago:Abstraction100002137 yago:Cipher106254239 yago:Communication100033020 yago:Message106253690
rdfs:comment In cryptography, xmx is a block cipher designed in 1997 by DavidM'Raïhi, David Naccache, Jacques Stern, and Serge Vaudenay. According to thedesigners it "uses public-key-like operations as confusion and diffusion means." Thecipher was designed for efficiency, and the only operations it uses are XORsand modular multiplications. The main parameters of xmx are variable, including theblock size and key size, which are equal, as wellas the number of rounds. In addition to the key, it also makesuse of an odd modulus n which is small enough to fit in a single block. (en)
rdfs:label Xmx (en)
owl:sameAs freebase:Xmx yago-res:Xmx wikidata:Xmx https://global.dbpedia.org/id/4xvyb
prov:wasDerivedFrom wikipedia-en:Xmx?oldid=1084904573&ns=0
foaf:isPrimaryTopicOf wikipedia-en:Xmx
is dbo:wikiPageDisambiguates of dbr:XMX
is dbo:wikiPageWikiLink of dbr:Encryption_by_date dbr:Index_of_cryptography_articles dbr:Jacques_Stern dbr:XMX
is foaf:primaryTopic of wikipedia-en:Xmx