Misplaced Pages

Crab (cipher)

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Block cipher This article is about the block cipher. For other uses, see Crab (disambiguation).
This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. Please help improve this article by introducing more precise citations. (September 2013) (Learn how and when to remove this message)
Crab
General
DesignersBurt Kaliski, Matt Robshaw
First published1993
Derived fromMD5
Related toSHACAL
Cipher detail
Key sizes80 bits
Block sizes8192 bits
StructureCryptographic hash function
Best public cryptanalysis
Proposed differential cryptanalysis using no more than 2 chosen plaintexts

In cryptography, Crab is a block cipher proposed by Burt Kaliski and Matt Robshaw at the first Fast Software Encryption workshop in 1993. Not really intended for use, Crab was developed to demonstrate how ideas from hash functions could be used to create a fast cipher.

Crab has an unusually large block size of 8192 bits. Its creators suggested using an 80-bit key, but the cipher could use any key size. The authors didn't specify an actual key schedule, only that the key is used to generate two large sets of subkeys: a permutation of the numbers 0 through 255, and an array of 2048 32-bit numbers. The block is divided into 256 32-bit subblocks, which are permuted at the beginning. Then the algorithm makes four passes over the data, each time applying one of four transformations adapted from MD5.

A brief note on the cryptanalysis of Crab is included in Markku-Juhani Saarinen's paper on block ciphers based on SHA-1 and MD5, published at FSE 2003. The author demonstrates a weakness in Crab that permits a distinguisher using no more than a dozen chosen plaintexts, and speculates that this can be converted into a full key-recovery attack using no more than 2 chosen plaintexts. Such an attack would depend on the key schedule used.

References

Block ciphers (security summary)
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
Cryptography
General
Mathematics


Stub icon

This cryptography-related article is a stub. You can help Misplaced Pages by expanding it.

Categories: