# Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis

@inproceedings{Aoki2000CamelliaA1, title={Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis}, author={Kazumaro Aoki and Tetsuya Ichikawa and Masayuki Kanda and Mitsuru Matsui and Shiho Moriai and Junko Nakajima and Toshio Tokita}, booktitle={Selected Areas in Cryptography}, year={2000} }

We present a new 128-bit block cipher called Camellia. [... ] Key Result The hardware design, which includes encryption and decryption and key schedule, occupies approximately 11K gates, which is the smallest among all existing 128-bit block ciphers as far as we know. Expand

## 448 Citations

Design of Encryption/Decryption Core for Block Cipher Camellia

- Computer Science
- 2016

A modifiedround operation block which unifies a register setting for key schedule and a conventional round operation block is proposed, applicable to security module of the areas such as telecommunications and energy.

Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES

- MathematicsISC
- 2003

This paper describes compact and high-speed hardware architectures for the 128-bit block ciphers AES and Camellia, and reports on their performances as implemented using ASIC libraries and an FPGA…

Cryptanalysis of reduced versions of the Camellia block cipher

- Computer Science, MathematicsIET Inf. Secur.
- 2012

A flaw in the approach used to choose plaintexts or ciphertexts in certain previously published square-like cryptanalytic results for Camellia is described and two possible approaches to correct them are given.

Crypto-Core Design using Camellia Cipher

- Computer Science
- 2021

The design has successfully done as it achieved expected encryption and decryption outcomes with acceptable performance and is found more efficient than FPGA-based design.

Software implementation and performance comparison of popular block ciphers on 8-bit low-cost microcontroller

- Computer Science
- 2010

According to the results obtained from target device, AES has better performance than other block ciphers in respect to throughput and code memory requirement and CAST5 and Camellia can be considered as a good alternative to AES.

Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher

- Computer Science, MathematicsIWSEC
- 2012

This paper describes a few 5 and 6-round properties of Camellia and uses them to give (higher-order) meet-in-the-middle attacks on 10-round Camellian with the FL/FL− 1 functions under 128 key bits.

The Dragon Stream Cipher: Design, Analysis, and Implementation Issues

- Computer Science, MathematicsThe eSTREAM Finalists
- 2008

The Dragon cipher is discussed from three perspectives: design, security analysis and implementation, making it highly competitive relative to other symmetric ciphers.

Compact Hardware Implementation of the Block Cipher Camellia with Concurrent Error Detection

- Computer Science, Mathematics2007 Canadian Conference on Electrical and Computer Engineering
- 2007

A compact hardware architecture for Camellia, where encryption and key scheduling share the same datapath and a four s-box iterative structure is employed, and a multiple parity code based error detection scheme is investigated.

Block Ciphers : fast Implementations on x86-64 Architecture

- Computer Science
- 2013

Encryption is being used more than ever before. It is used to prevent eavesdropping on our communications over cell phone calls and Internet, securing network connections, making e-commerce and…

HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest

- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2022

Although HARPOCRATES is appropriate for the encryption of data-at-rest, it is also well-suited in data-in-transit environments and the software implementation of the cipher results in better throughput than many well-known ciphers.

## References

SHOWING 1-10 OF 102 REFERENCES

Cryptanalysis of a Reduced Version of the Block Cipher E2

- Computer Science, MathematicsFSE
- 1999

This paper deals with truncated differential cryptanalysis of the 128-bit block cipher E2, which is an AES candidate designed and submitted by NTT and shows a non-trivial seven round byte characteristic, which leads to a possible attack of E2 reduced to eight rounds without IT and FT by a chosen plaintext scenario.

New Block Encryption Algorithm MISTY

- Computer Science, MathematicsFSE
- 1997

The software implementation of MISTY1 with eight rounds can encrypt a data stream in CBC mode at a speed of 20Mbps and 40Mbps on Pentium/100MHz and PA-7200/120MHz, respectively.

Square Attack on Reduced Camellia Cipher

- Computer Science, MathematicsICICS
- 2001

With the detail analysis of round function in Camellia, Square attack extension to 6 rounds faster than exhaustive key search was found and shows that Square attack is the best attack on CamellIA.

The Block Cipher Square

- Computer Science, MathematicsFSE
- 1997

A new 128-bit block cipher called Square, which concentrates on the resistance against differential and linear cryptanalysis, and the publication of the resulting cipher for public scrutiny is published.

The Interpolation Attack on Block Ciphers

- Computer Science, MathematicsFSE
- 1997

This paper cryptanalyse 5 rounds of a variant of SHARK, which deviates only slightly from the proposed SHark, and shows that there exist ciphers constructed according to this design strategy which can be broken faster than claimed.

Markov Ciphers and Differential Cryptanalysis

- Computer Science, MathematicsEUROCRYPT
- 1991

It is shown that PES (8) and PES(16) are immune to differential cryptanalysis after sufficiently many rounds, and a new design principle for Markov ciphers, viz., that their transition probability matrices should not be symmetric is suggested.

Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis

- Computer Science, MathematicsASIACRYPT
- 2001

A nontrivial 9-round byte characteristic is shown, which may lead to a possible attack of reduced-round version of Camellia without input/output whitening, FL or FL-1 in a chosen plain text scenario.

Block Ciphers - A Survey

- Computer Science, MathematicsState of the Art in Applied Cryptography
- 1997

This paper gives a short overview of the state of the art of secret key block ciphers, namely for encryption, and focuses on the main application of block cips for encryption.

Optimized Software Implementations of E 2

- Computer Science
- 2000

Several optimization techniques for SPN (Substitution-Permutation Network) on 32or 64bit processors are shown, applicable to other byte-oriented ciphers.

Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs *

- Computer Science
- 2001

The implementation results of several cryptographic algorithms on the Motorola 6805 and Hitachi H8/300 CPUs, including Data Encryption Standard (DES), Advanced Enc encryption Standard (AES), and Camellia are described.