Paper 2003/258

Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.

Marcin Rogawski

Abstract

Alghoritms: HIEROCRYPT-3, CAMELLIA and ANUBIS, GRAND CRU, NOEKEON, NUSH, Q, RC6, SAFER++128, SC2000, SHACAL were requested for the submission of block ciphers (high level block cipher) to NESSIE (New European Schemes for Signatures, Integrity, and Encryption) project. The main purpose of this project was to put forward a portfolio of strong cryptographic primitives of various types. The NESSIE project was a three year long project and has been divided into two phases. The first was finished in June 2001r. CAMELLIA, RC6, SAFER++128 and SHACAL were accepted for the second phase of the evaluation process. HIEROCRYPT-3 had key schedule problems, and there were attacks for up to 3,5 rounds out of 6, at least hardware implementations of this cipher were extremely slow. HIEROCRYPT-3 was not selected to Phase II. CAMELLIA was selected as an algorithm suggested for future standard. In the paper we present the hardware implementations these two algorithms with 128-bit blocks and 128-bit keys, using ALTERA devices and their comparisons.

Note: probably the fastest implementation of iterative architecture Hierocrypt-3 algorithm

Metadata
Available format(s)
PDF
Category
Implementation
Publication info
Published elsewhere. presented on Enigma conference in 2003r.
Keywords
block ciphers
Contact author(s)
mrogawski @ poczta onet pl
History
2003-12-20: received
Short URL
https://ia.cr/2003/258
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2003/258,
      author = {Marcin Rogawski},
      title = {Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using {ALTERA} devices.},
      howpublished = {Cryptology {ePrint} Archive, Paper 2003/258},
      year = {2003},
      url = {https://eprint.iacr.org/2003/258}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.