The DBlock family of block ciphers

WenLing Wu, Lei Zhang, XiaoLi Yu
2015 Science China Information Sciences  
In this paper, we propose a new family of block ciphers named DBlock. It consists of three variants which are specified as respectively. DBlock-n has the equal n-bit block length and key length. The structure of DBlock successfully combines the advantages of Feistel and Type-2 generalized Feistel structures together. Also, its design of round function employs different linear transforms operating on various word-sizes, which efficiently improve the diffusion effect. For key schedule of DBlock,
more » ... t basically employs the same module used in encryption, except the choice of different byte permutations, which can improve its suitability for various implementation environments and also enhance its security against many cryptanalytic techniques. Our preliminary evaluation shows that DBlock can achieve enough security margin against known attacks, and it can also obtain excellent performances on various software and hardware platforms. = y 0 , z 0 = y 2 . Y = (y 11 , y 10 , ..., y 3 , y 2 , y 1 , y 0 ) −→ Z = (z 11 , z 10 , ..., z 3 , z 2 , z 1 , z 0 ), z 11 = y 9 , z 10 = y 6 , z 9 = y 4 , z 8 = y 3 , z 7 = y 5 , z 6 = y 11 , z 5 = y 0 , z 4 = y 2 , z 3 = y 10 , z 2 = y 7 , z 1 = y 8 , z 0 = y 1 . z 15 = y 10 , z 14 = y 5 , z 13 = y 0 , z 12 = y 15 , z 11 = y 6 , z 10 = y 11 , z 9 = y 12 , z 8 = y 1 , z 7 = y 13 , z 6 = y 8 , z 5 = y 7 , z 4 = y 2 , z 3 = y 4 , z 2 = y 9 , z 1 = y 14 , z 0 = y 3 . (3) Function G n . G n is the main nonlinear transform in encryption and it consists of n/64 identical 32-bit nonlinear function T in parallel. P * 128 : {0, 1} 64 −→ {0, 1} 64 , Y = (y 7 , y 6 , y 5 , y 4 , y 3 , y 2 , y 1 , y 0 ) −→ Z = (z 7 , z 6 , z 5 , z 4 , z 3 , z 2 , z 1 , z 0 ), z 7 = y 1 , z 6 = y 0 , z 5 = y 7 , z 4 = y 6 , z 3 = y 5 , z 2 = y 4 , z 1 = y 2 , z 0 = y 3 . P * 192 : {0, 1} 96 −→ {0, 1} 96 , Y = (y 11 , y 10 , ..., y 3 , y 2 , y 1 , y 0 ) −→ Z = (z 11 , z 10 , ..., z 3 , z 2 , z 1 , z 0 ), Wu W L, et al. Sci China Inf Sci March 2015 Vol. 58 032105:6 z 11 = y 2 , z 10 = y 11 , z 9 = y 4 , z 8 = y 1 , z 7 = y 10 , z 6 = y 9 , z 5 = y 0 , z 4 = y 7 , z 3 = y 5 , z 2 = y 8 , z 1 = y 3 , z 0 = y 6 . P * 256 : {0, 1} 128 −→ {0, 1} 128 , Y = (y 15 , y 14 , ..., y 3 , y 2 , y 1 , y 0 ) −→ Z = (z 15 , z 14 , ..., z 3 , z 2 , z 1 , z 0 ), z 15 = y 11 , z 14 = y 7 , z 13 = y 3 , z 12 = y 15 , z 11 = y 6 , z 10 = y 2 , z 9 = y 14 , z 8 = y 10 , z 7 = y 1 , z 6 = y 5 , z 5 = y 9 , z 4 = y 13 , z 3 = y 8 , z 2 = y 12 , z 1 = y 0 , z 0 = y 4 .
doi:10.1007/s11432-014-5219-0 fatcat:kmj5v65jijgmpa3kygk25geyh4