written 8.4 years ago by | modified 2.8 years ago by |
Mumbai University > EXTC > Sem 7 > Data Compression and Encryption
Marks: 10 M
Year: DEC 2014
written 8.4 years ago by | modified 2.8 years ago by |
Mumbai University > EXTC > Sem 7 > Data Compression and Encryption
Marks: 10 M
Year: DEC 2014
written 8.4 years ago by | • modified 8.4 years ago |
Description of IDEA:
The IDEA encryption is shown in the following diagrams:
8.Decryption
How can the round in IDEA be reversed, since all four quarters of the block are changed at the same time, based on a function of all four of their old values? Well, the trick to that is that A xor C isn't changed when both A and C are XORed by the same value, that value cancels out, no matter what that value might be. And the same applies to B xor D. And since the values used are functions of (A xor C) and (B xor D), they are still available.
This cross-footed round, rather than a Feistel round, is the most striking distinguishing factor of IDEA, although its use of multiplication, addition, and XOR to avoid the use of S-boxes is also important
The decryption key schedule is:
The first four subkeys for decryption are:
$KD(1) = 1/K(49) \\ KD(2) = -K(50) \\ KD(3) = -K(51) \\ KD(4) = 1/K(52)$
and they do not quite follow the same pattern as the remaining subkeys which follow.
The following is repeated eight times, adding 6 to every decryption key's index and subtracting 6 from every encryption key's index:
$KD(5) = K(47) \\ KD(6) = K(48) \\ KD(7) = 1/K(43) \\ KD(8) = -K(45) \\ KD(9) = -K(44) \\ KD(10) = 1/K(46)$
9.Subkey generation:
The 128-bit key of IDEA is taken as the first eight subkeys, K(1) through K(8). The next eight subkeys are obtained the same way, after a 25-bit circular left shift, and this is repeated until all encryption subkeys are derived. This method of subkey generation is regular, and this may be a weakness. However, IDEA is considered to be highly secure, having stood up to all forms of attack so far tried by the academic community.