7696081217

7696081217



Figurę 12: The components of the KASUMI błock cipher (from [6]).

•    Encryption key K is used to generate a set of round keys (KLi,KOi,KIi) for each round i

•    Each round computes a different function, as long as the round keys are different

•    The same algorithm is used both for encryption and decryption

The development of the KASUMI błock cipher is based on a previous błock cipher called MISTY1. MISTY1 was chosen as the foundation for the 3GPP ciphering algorithm due to its proven security against the most advanced methods to break błock ciphers, namely cryptanalysis techniąues. In addition, MISTY1 was heavily optimized for hardware implementation.

Figurę 12 shows the organization of the KASUMI błock cipher. It can be seen that the function / computed by each round i is composed of two subfunctions FLi and FOi, which depend on the inputs of the round and the corresponding set of round keys. The figurę also depicts the internal structure of each of the two functions. The FL function has a simple structure and consists of logical operations and shifts on the inputs. FO is morę complicated and has itself a Feistel structure with three rounds, each of which reąuires computing the FI subfunction that, in turn, is madę up of three rounds as well.

According to the specification, both the confidentiality and integrity algorithms were designed to allow a great variety of software and hardware implementation options. In addition, the algorithms must be implemented taking into account several constraints and reąuirements [4]. Hardware implementations, for instance, are reąuired to use at most 10000 gates, they must achieve encryption rates in the order of 2 Mbps, sińce that is the likely maximum data ratę. The specifications also indicate that in order to meet the throughput reąuirements the implementation must operate at freąuencies upwards 200 MHz. From these comments it can be noticed that a considerable effort

18



Wyszukiwarka

Podobne podstrony:
SCAN0125 44 Clinical Anatomy of the Visual System mented melanocytes, fibroblasts, and collagen band
SCAN0126 45 CHAPTER 3 ▼ Uvea FIGURĘ 3-12 Light micrograph of transverse section of the ciliary body,
NPL Report MATC(A) 164 Figurę 12. Test arrangements of resistor specimen. Figurę 13. Predicted major
1 charge, 8 days of battery life Adapt to the mainstream Type-C charging linę. If it is used for 30
BR01 DELL-10843 The Supremo Space Spectacufar from Univorsal! THERE IS ONE WIAN LEFT IN THE UNIVERSE
HINDIKB Font: DevanagariDelhiSSK Keyboard: Hindi (Yersion 2.0) ShiftOther letters and features: The
12 GroEL GroES Figurę 9-25 Rcactiun cydc of Ihe (JroEL/ES chaperonin system in protein folding. Sec
Configuration In the normal arrangement, the stubs are separated by a distance of L = 3A/8 as shown
REIDER PART 284 344_Chapter 9_Lumbar Spine Figurę 9-11. Lumbar spine rotation. Figurę 9-12. Palpati
Plato for GiłoeAmp* 9700 with dunl 96-wefl *ampi© błock rrxxfcj* Components of the 0.2-mL 96-Well Te
f3 1 C header and source files to implement native methods FIGURE 3.1 How the p rogranis of the JDK
FIG 08(1) Figurę 28. The inner mechanism of a magnelic lock is rather simpEe. Figurę 29. The magneli

więcej podobnych podstron