KHAZAD
   HOME

TheInfoList



OR:

In
cryptography Cryptography, or cryptology (from grc, , translit=kryptós "hidden, secret"; and ''graphein'', "to write", or ''-logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adver ...
, KHAZAD is a
block cipher In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
designed by
Paulo S. L. M. Barreto Paulo S. L. M. Barreto (born 1965) is a Brazilian cryptographer and one of the designers of the Whirlpool (algorithm), Whirlpool cryptographic hash function, hash function and the block ciphers Anubis (cipher), Anubis and KHAZAD, together with Vin ...
together with
Vincent Rijmen Vincent Rijmen (; born 16 October 1970) is a Belgian cryptographer and one of the two designers of the Rijndael, the Advanced Encryption Standard. Rijmen is also the co-designer of the WHIRLPOOL cryptographic hash function, and the block cipher ...
, one of the designers of the
Advanced Encryption Standard The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001. AES is a variant ...
( Rijndael). KHAZAD is named after
Khazad-dûm In the fictional world of J. R. R. Tolkien, Moria, also named Khazad-dûm, is an ancient subterranean complex in Middle-earth, comprising a vast labyrinthine network of tunnels, chambers, mines and halls under the Misty Mountains, with doors on ...
, the fictional dwarven realm in the writings of
J. R. R. Tolkien John Ronald Reuel Tolkien (, ; 3 January 1892 – 2 September 1973) was an English writer and philologist. He was the author of the high fantasy works ''The Hobbit'' and ''The Lord of the Rings''. From 1925 to 1945, Tolkien was the Rawlins ...
(see also Khazad). KHAZAD was presented at the first
NESSIE NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000 to 2003 to identify secure cryptographic primitives. The project was comparable to the NIST AES process and the Japanese Gov ...
workshop in 2000, and, after some small changes, was selected as a finalist in the project. KHAZAD has an eight-round substitution–permutation network structure similar to that of
SHARK Sharks are a group of elasmobranch fish characterized by a cartilaginous skeleton, five to seven gill slits on the sides of the head, and pectoral fins that are not fused to the head. Modern sharks are classified within the clade Selachimo ...
, a forerunner to Rijndael. The design is classed as a "''legacy-level''" algorithm, with a 64-bit block size (in common with older
cipher In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
s such as
DES Des is a masculine given name, mostly a short form (hypocorism) of Desmond. People named Des include: People * Des Buckingham, English football manager * Des Corcoran, (1928–2004), Australian politician * Des Dillon (disambiguation), sever ...
and
IDEA In common usage and in philosophy, ideas are the results of thought. Also in philosophy, ideas can also be mental representational images of some object. Many philosophers have considered ideas to be a fundamental ontological category of being ...
) and a 128-bit
key Key or The Key may refer to: Common meanings * Key (cryptography), a piece of information that controls the operation of a cryptography algorithm * Key (lock), device used to control access to places or facilities restricted by a lock * Key (map ...
. KHAZAD makes heavy use of
involution Involution may refer to: * Involute, a construction in the differential geometry of curves * '' Agricultural Involution: The Processes of Ecological Change in Indonesia'', a 1963 study of intensification of production through increased labour inpu ...
s as subcomponents; this minimises the difference between the algorithms for
encryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
and
decryption In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decip ...
. The authors have stated that, ''"KHAZAD is not (and will never be)
patent A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an enabling disclosure of the invention."A p ...
ed. It may be used free of charge for any purpose."'' Frédéric Muller has discovered an attack which can break five of KHAZAD's eight rounds. No attacks better than this are known as of August 2009.


References

* * *


External links

* {{Cryptography navbox , block Block ciphers Free ciphers Things named after Tolkien works