Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis

@inproceedings{Aoki2000CamelliaA1,
  title={Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis},
  author={Kazumaro Aoki and Tetsuya Ichikawa and Masayuki Kanda and Mitsuru Matsui and Shiho Moriai and Junko Nakajima and Toshio Tokita},
  booktitle={Selected Areas in Cryptography},
  year={2000}
}
We present a new 128-bit block cipher called Camellia. [] Key Result The hardware design, which includes encryption and decryption and key schedule, occupies approximately 11K gates, which is the smallest among all existing 128-bit block ciphers as far as we know.
Design of Encryption/Decryption Core for Block Cipher Camellia
TLDR
A modifiedround operation block which unifies a register setting for key schedule and a conventional round operation block is proposed, applicable to security module of the areas such as telecommunications and energy.
Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES
This paper describes compact and high-speed hardware architectures for the 128-bit block ciphers AES and Camellia, and reports on their performances as implemented using ASIC libraries and an FPGA
Cryptanalysis of reduced versions of the Camellia block cipher
TLDR
A flaw in the approach used to choose plaintexts or ciphertexts in certain previously published square-like cryptanalytic results for Camellia is described and two possible approaches to correct them are given.
Crypto-Core Design using Camellia Cipher
TLDR
The design has successfully done as it achieved expected encryption and decryption outcomes with acceptable performance and is found more efficient than FPGA-based design.
Software implementation and performance comparison of popular block ciphers on 8-bit low-cost microcontroller
TLDR
According to the results obtained from target device, AES has better performance than other block ciphers in respect to throughput and code memory requirement and CAST5 and Camellia can be considered as a good alternative to AES.
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher
TLDR
This paper describes a few 5 and 6-round properties of Camellia and uses them to give (higher-order) meet-in-the-middle attacks on 10-round Camellian with the FL/FL− 1 functions under 128 key bits.
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues
TLDR
The Dragon cipher is discussed from three perspectives: design, security analysis and implementation, making it highly competitive relative to other symmetric ciphers.
Compact Hardware Implementation of the Block Cipher Camellia with Concurrent Error Detection
  • Huiju Cheng, H. Heys
  • Computer Science, Mathematics
    2007 Canadian Conference on Electrical and Computer Engineering
  • 2007
TLDR
A compact hardware architecture for Camellia, where encryption and key scheduling share the same datapath and a four s-box iterative structure is employed, and a multiple parity code based error detection scheme is investigated.
Block Ciphers : fast Implementations on x86-64 Architecture
Encryption is being used more than ever before. It is used to prevent eavesdropping on our communications over cell phone calls and Internet, securing network connections, making e-commerce and
HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-rest
TLDR
Although HARPOCRATES is appropriate for the encryption of data-at-rest, it is also well-suited in data-in-transit environments and the software implementation of the cipher results in better throughput than many well-known ciphers.
...
...

References

SHOWING 1-10 OF 102 REFERENCES
Cryptanalysis of a Reduced Version of the Block Cipher E2
TLDR
This paper deals with truncated differential cryptanalysis of the 128-bit block cipher E2, which is an AES candidate designed and submitted by NTT and shows a non-trivial seven round byte characteristic, which leads to a possible attack of E2 reduced to eight rounds without IT and FT by a chosen plaintext scenario.
New Block Encryption Algorithm MISTY
  • M. Matsui
  • Computer Science, Mathematics
    FSE
  • 1997
TLDR
The software implementation of MISTY1 with eight rounds can encrypt a data stream in CBC mode at a speed of 20Mbps and 40Mbps on Pentium/100MHz and PA-7200/120MHz, respectively.
Square Attack on Reduced Camellia Cipher
TLDR
With the detail analysis of round function in Camellia, Square attack extension to 6 rounds faster than exhaustive key search was found and shows that Square attack is the best attack on CamellIA.
The Block Cipher Square
TLDR
A new 128-bit block cipher called Square, which concentrates on the resistance against differential and linear cryptanalysis, and the publication of the resulting cipher for public scrutiny is published.
The Interpolation Attack on Block Ciphers
TLDR
This paper cryptanalyse 5 rounds of a variant of SHARK, which deviates only slightly from the proposed SHark, and shows that there exist ciphers constructed according to this design strategy which can be broken faster than claimed.
Markov Ciphers and Differential Cryptanalysis
TLDR
It is shown that PES (8) and PES(16) are immune to differential cryptanalysis after sufficiently many rounds, and a new design principle for Markov ciphers, viz., that their transition probability matrices should not be symmetric is suggested.
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
TLDR
A nontrivial 9-round byte characteristic is shown, which may lead to a possible attack of reduced-round version of Camellia without input/output whitening, FL or FL-1 in a chosen plain text scenario.
Block Ciphers - A Survey
  • L. Knudsen
  • Computer Science, Mathematics
    State of the Art in Applied Cryptography
  • 1997
TLDR
This paper gives a short overview of the state of the art of secret key block ciphers, namely for encryption, and focuses on the main application of block cips for encryption.
Optimized Software Implementations of E 2
TLDR
Several optimization techniques for SPN (Substitution-Permutation Network) on 32or 64bit processors are shown, applicable to other byte-oriented ciphers.
Performance Evaluation of AES/DES/Camellia On the 6805 and H8/300 CPUs *
TLDR
The implementation results of several cryptographic algorithms on the Motorola 6805 and Hitachi H8/300 CPUs, including Data Encryption Standard (DES), Advanced Enc encryption Standard (AES), and Camellia are described.
...
...