Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
International Data Encryption Algorithm
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Symmetric-key block cipher}} {{Infobox block cipher | name = IDEA | image = [[Image:International Data Encryption Algorithm InfoBox Diagram.svg|280px|center]] | caption = An encryption round of IDEA | designers = [[Xuejia Lai]] and [[James Massey]] | derived from = PES | derived to = [[MMB (cipher)|MMB]], [[MESH (cipher)|MESH]], [[Akelarre (cipher)|Akelarre]], <br/>[[IDEA NXT]] (FOX) | key size = 128 bits | block size = 64 bits | structure = [[Lai–Massey scheme]] | rounds = 8.5 | cryptanalysis = The key can be recovered with a computational complexity of 2<sup>126.1</sup> using narrow [[biclique attack|bicliques]]. This attack is computationally faster than a full brute-force attack, though not, as of 2013, computationally feasible.<ref>{{cite web |url=http://www.cs.bris.ac.uk/eurocrypt2012/Program/Tues/Rechberger.pdf |website=www.cs.bris.ac.uk |title=Narrow-Bicliques: Cryptanalysis of Full IDEA}}</ref> }} In [[cryptography]], the '''International Data Encryption Algorithm''' ('''IDEA'''), originally called '''Improved Proposed Encryption Standard''' ('''IPES'''), is a [[Symmetric-key algorithm|symmetric-key]] [[block cipher]] designed by [[James Massey]] of [[ETH Zurich]] and [[Xuejia Lai]] and was first described in 1991. The algorithm was intended as a replacement for the [[Data Encryption Standard]] (DES). IDEA is a minor revision of an earlier [[cipher]], the Proposed Encryption Standard (PES). The cipher was designed under a research contract with the Hasler Foundation, which became part of Ascom-Tech AG. The cipher was patented in a number of countries but was freely available for non-commercial use. The name "IDEA" is also a [[trademark]]. The last [[patent]]s expired in 2012, and IDEA is now patent-free and thus completely free for all uses.<ref>{{cite web|url=http://worldwide.espacenet.com/publicationDetails/biblio?locale=de_EP&CC=EP&NR=0482154 |title=Espacenet - Bibliografische Daten |language=de |publisher=Worldwide.espacenet.com |access-date=2013-06-15}}</ref> IDEA was used in [[Pretty Good Privacy]] (PGP) v2.0 and was incorporated after the original cipher used in v1.0, [[BassOmatic]], was found to be insecure.<ref>{{Citation | last = Garfinkel | first = Simson | author-link = Simson Garfinkel | title = PGP: Pretty Good Privacy | publisher = [[O'Reilly Media]] | date = December 1, 1994 | pages = 101–102 | isbn = 978-1-56592-098-9 | postscript = .}}</ref> IDEA is an optional algorithm in the [[OpenPGP]] standard. ==Operation== IDEA operates on 64-bit [[block size (cryptography)|blocks]] using a 128-bit [[key (cryptography)|key]] and consists of a series of 8 identical transformations (a ''round'', see the illustration) and an output transformation (the ''half-round''). The processes for encryption and decryption are similar. IDEA derives much of its security by interleaving operations from different [[group (mathematics)|groups]] — [[modular arithmetic|modular]] addition and multiplication, and bitwise [[XOR|eXclusive OR (XOR)]] — which are algebraically "incompatible" in some sense. In more detail, these operators, which all deal with 16-bit quantities, are: * Bitwise [[XOR]] (exclusive OR) (denoted with a blue circled plus <big><big>{{fontcolor|blue|⊕}}</big></big>). * Addition modulo 2<sup>16</sup> (denoted with a green boxed plus <big><big>{{fontcolor|#0F0|⊞}}</big></big>). * Multiplication modulo 2<sup>16</sup> + 1, where the all-zero word (0x0000) in inputs is interpreted as 2<sup>16</sup>, and 2<sup>16</sup> in output is interpreted as the all-zero word (0x0000) (denoted by a red circled dot <big><big>{{fontcolor|red|⊙}}</big></big>). After the 8 rounds comes a final “half-round”, the output transformation illustrated below (the swap of the middle two values cancels out the swap at the end of the last round, so that there is no net swap): :[[Image:International Data Encryption Algorithm InfoBox Diagram Output Trans.png|300px]] ===Structure=== The overall structure of IDEA follows the [[Lai–Massey scheme]]. XOR is used for both subtraction and addition. IDEA uses a key-dependent half-round function. To work with 16-bit words (meaning 4 inputs instead of 2 for the 64-bit block size), IDEA uses the Lai–Massey scheme twice in parallel, with the two parallel round functions being interwoven with each other. To ensure sufficient diffusion, two of the sub-blocks are swapped after each round. ===Key schedule=== Each round uses 6 16-bit sub-keys, while the half-round uses 4, a total of 52 for 8.5 rounds. The first 8 sub-keys are extracted directly from the key, with K1 from the first round being the lower 16 bits; further groups of 8 keys are created by rotating the main key left 25 bits between each group of 8. This means that it is rotated less than once per round, on average, for a total of 6 rotations. ===Decryption=== Decryption works like encryption, but the order of the round keys is inverted, and the subkeys for the odd rounds are inversed. For instance, the values of subkeys K1–K4 are replaced by the inverse of K49–K52 for the respective group operation, K5 and K6 of each group should be replaced by K47 and K48 for decryption. ==Security== The designers analysed IDEA to measure its strength against [[differential cryptanalysis]] and concluded that it is immune under certain assumptions. No successful [[linear cryptanalysis|linear]] or algebraic weaknesses have been reported. {{As of|2007}}, the best attack applied to all keys could break IDEA reduced to 6 rounds (the full IDEA cipher uses 8.5 rounds).<ref name="idea-cryptanalysis"> {{cite book | author = Biham, E. | author-link = Eli Biham | author2 = Dunkelman, O. | author3 = Keller, N. | chapter= A New Attack on 6-Round IDEA | url = http://www.cosic.esat.kuleuven.be/publications/article-920.ps | title = Proceedings of Fast Software Encryption, 2007, Lecture Notes in Computer Science | publisher = [[Springer-Verlag]] }}</ref> Note that a "break" is any attack that requires less than 2<sup>128</sup> operations; the 6-round attack requires 2<sup>64</sup> known plaintexts and 2<sup>126.8</sup> operations. [[Bruce Schneier]] thought highly of IDEA in 1996, writing: "In my opinion, it is the best and most secure block algorithm available to the public at this time." (''Applied Cryptography'', 2nd ed.) However, by 1999 he was no longer recommending IDEA due to the availability of faster algorithms, some progress in its [[cryptanalysis]], and the issue of patents.<ref>{{cite web |url=http://slashdot.org/interviews/99/10/29/0832246.shtml |title=Slashdot: Crypto Guru Bruce Schneier Answers |date=29 October 1999 |publisher=slashdot.org |access-date=2010-08-15 }}</ref> In 2011 full 8.5-round IDEA was broken using a meet-in-the-middle attack.<ref>{{cite journal |last1=Biham |first1=Eli |last2=Dunkelman |first2=Orr |last3=Keller |first3=Nathan |last4=Shamir |first4=Adi |author-link1=Eli Biham |author-link4=Adi Shamir |title=New Attacks on IDEA with at Least 6 Rounds |journal=Journal of Cryptology |date=2011-08-22 |volume=28 |issue=2 |pages=209–239 |doi=10.1007/s00145-013-9162-9 |doi-access=free |language=en |issn=0933-2790}}</ref> Independently in 2012, full 8.5-round IDEA was broken using a narrow-[[biclique attack|bicliques attack]], with a reduction of cryptographic strength of about 2 bits, similar to the effect of the previous bicliques attack on [[Advanced Encryption Standard|AES]]; however, this attack does not threaten the security of IDEA in practice.<ref name="idea-narrow-bicliques">{{cite book |last1=Khovratovich |first1=Dmitry |last2=Leurent |first2=Gaëtan |last3=Rechberger |first3=Christian |title=Advances in Cryptology – EUROCRYPT 2012 |chapter=Narrow-Bicliques: Cryptanalysis of Full IDEA |volume=7237 |date=2012 |pages=392–410 |doi=10.1007/978-3-642-29011-4_24 |doi-access=free |language=en|series=Lecture Notes in Computer Science |isbn=978-3-642-29010-7 }}</ref> ===Weak keys=== The very simple key schedule makes IDEA subject to a class of [[weak key]]s; some keys containing a large number of 0 bits produce [[weak encryption]].<ref name=weak>{{Cite book|first1=Joan |last1=Daemen |author1-link=Joan Daemen |first2=Rene |last2=Govaerts |first3=Joos |last3=Vandewalle |title=Advances in Cryptology — CRYPTO' 93 |chapter=Weak Keys for IDEA |series=Lecture Notes in Computer Science |year=1994 |volume=773 |pages=224–231 |citeseerx = 10.1.1.51.9466|doi=10.1007/3-540-48329-2_20 |isbn=978-3-540-57766-9 }}</ref> These are of little concern in practice, being sufficiently rare that they are unnecessary to avoid explicitly when generating keys randomly. A simple fix was proposed: XORing each subkey with a 16-bit constant, such as 0x0DAE.<ref name=weak/><ref>{{Citation |title=A note on Weak Keys of PES, IDEA and some Extended Variants |first1=Jorge Jr. |last1=Nakahara |first2=Bart |last2=Preneel |first3=Joos |last3=Vandewalle |year=2002 |citeseerx=10.1.1.20.1681 }}</ref> Larger classes of weak keys were found in 2002.<ref name=weak2>{{Citation |url=http://www.cosic.esat.kuleuven.be/publications/article-189.pdf |title=New Weak-Key Classes of IDEA |first1=Alex |last1=Biryukov |first2=Jorge Jr. |last2=Nakahara |first3=Bart |last3=Preneel |first4=Joos |last4=Vandewalle |journal=Information and Communications Security, 4th International Conference, ICICS 2002 |series=Lecture Notes in Computer Science 2513 |pages=315–326 |quote=While the zero-one weak keys problem of IDEA can be corrected just by XORing a fixed constant to all the keys (one such constant may be 0DAE<sub>x</sub> as suggested in [4]) the problem with the runs of ones may still remain and will require complete redesign of the IDEA key schedule. }}</ref> This is still of negligible probability to be a concern to a randomly chosen key, and some of the problems are fixed by the constant XOR proposed earlier, but the paper is not certain if all of them are. A more comprehensive redesign of the IDEA key schedule may be desirable.<ref name=weak2/> ==Availability== A patent application for IDEA was first filed in [[Switzerland]] (CH A 1690/90) on May 18, 1990, then an international patent application was filed under the [[Patent Cooperation Treaty]] on May 16, 1991. Patents were eventually granted in [[Austria]], [[France]], [[Germany]], [[Italy]], the [[Netherlands]], [[Spain]], [[Sweden]], [[Switzerland]], the [[United Kingdom]], ({{EPO Register|appno=91908542|patno=0482154|patent=yes}}, filed May 16, 1991, issued June 22, 1994 and expired May 16, 2011), the [[United States]] ({{US patent|5214703}}, issued May 25, 1993 and expired January 7, 2012) and [[Japan]] (JP 3225440, expired May 16, 2011).<ref>{{cite web|url=http://lists.gnupg.org/pipermail/gnupg-users/2012-December/045844.html |title=GnuPG 1.4.13 released |date=21 December 2012 |publisher=Werner Koch |access-date=2013-10-06}}</ref> MediaCrypt AG is now offering a successor to IDEA and focuses on its new cipher (official release in May 2005) [[IDEA NXT]], which was previously called FOX. == Literature == * {{cite book |doi=10.1007/978-3-540-24654-1_9 |chapter=A New Meet-in-the-Middle Attack on the IDEA Block Cipher |title=Selected Areas in Cryptography |series=Lecture Notes in Computer Science |year=2004 |last1=Demirci |first1=Hüseyin |last2=Selçuk |first2=Ali Aydin |last3=Türe |first3=Erkan |volume=3006 |pages=117–129 |isbn=978-3-540-21370-3 }} * {{cite book |doi=10.1007/3-540-46877-3_35 |citeseerx=10.1.1.14.3451 |chapter=A Proposal for a New Block Encryption Standard |title=Advances in Cryptology — EUROCRYPT '90 |series=Lecture Notes in Computer Science |year=1991 |last1=Lai |first1=Xuejia |last2=Massey |first2=James L. |volume=473 |pages=389–404 |isbn=978-3-540-53587-4 }} * {{cite book |doi=10.1007/3-540-46416-6_2 |chapter=Markov Ciphers and Differential Cryptanalysis |title=Advances in Cryptology — EUROCRYPT '91 |series=Lecture Notes in Computer Science |year=1991 |last1=Lai |first1=Xuejia |last2=Massey |first2=James L. |last3=Murphy |first3=Sean |volume=547 |pages=17–38 |isbn=978-3-540-54620-7 }} ==References== {{Reflist|30em}} ==External links== * [https://web.archive.org/web/20041019102316/http://www.rsasecurity.com/rsalabs/node.asp?id=2254 RSA FAQ on Block Ciphers] * [http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#IDEA SCAN entry for IDEA] * [http://cypherspace.org/adam/rsa/idea.html IDEA in 448 bytes of 80x86] * [http://www.informationsuebertragung.ch/indexAlgorithmen.html IDEA Applet] * [http://www.source-code.biz/idea/java/ Java source code] {{Cryptography navbox | block}} [[Category:Block ciphers]] [[Category:Broken block ciphers]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:As of
(
edit
)
Template:Citation
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Cryptography navbox
(
edit
)
Template:EPO Register
(
edit
)
Template:Fontcolor
(
edit
)
Template:Infobox block cipher
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)
Template:US patent
(
edit
)