From: “Nobuki Nakatuji” <bd1011@hotmail.com>
To: cypherpunks@toad.com
Message Hash: 78393a3b456df0f242b25a90ba3cc3b2909724124747975a8fe82556231ba5a2
Message ID: <19971019035058.12956.qmail@hotmail.com>
Reply To: N/A
UTC Datetime: 1997-10-19 04:12:16 UTC
Raw Date: Sun, 19 Oct 1997 12:12:16 +0800
From: "Nobuki Nakatuji" <bd1011@hotmail.com>
Date: Sun, 19 Oct 1997 12:12:16 +0800
To: cypherpunks@toad.com
Subject: about MISTY encryption algorithm
Message-ID: <19971019035058.12956.qmail@hotmail.com>
MIME-Version: 1.0
Content-Type: text/plain
itsubishi Electric Corp. has developed new secret-key cryptosystem
MISTY1 and MISTY2, which are ciphers with
128-bit key and 64-bit data block. They are provably secure against
differential and linear cryptanalysis,
and also fast on software implementations as well as on hardware
platforms. Using ciphers on wide-area
networks requires a method to maintain security as long as its
encryption key (password commonly shared by a
sender and a receiver) is kept secret, even if the mechanism of the
encryption is made public. However,
possibilities of unauthorized access will increase when the encryption
mechanism is made public. In fact,
several encryption algorithms, whose specifications were made public,
have been compelled to make
specification changes, and to sacrifice their encryption speed in return
for an increased cipher strength to
protect against recent decoding methods. This is why an encryption
system whose security against these
decoding method is strictly evaluated at the design stage has become
necessary. Since announcing its linear
cryptanalysis, Mitsubishi Electric has been making efforts to develop
encryption technology backed by
adequate security. In January 1994, Mitsubishi Electric performed the
first successful experiment to decode
the Data Encryption Standard (DES), an American standard commercial
encryption system, to quantitatively
evaluate its strength using this linear cryptanalysis. Using this
evaluation technology, Mitsubishi Electric
has developed an encryption algorithm that provides sufficient security
and achieves high speed encryption.
______________________________________________________
Get Your Private, Free Email at http://www.hotmail.com
Return to October 1997
Return to “Warpy <warpy@sekurity.org>”