This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2, which was proposed to the AES (Advanced Encryption Standard) candidates. This algorithm supports 128-bit, 192-bit, and 256-bit secret keys. The design philosophy of E2 is highly conservative; the structure uses 12-round Feistel as its main function whose round function is constructed with 2-round SPN structure, and initial/final transformational functions. E2 has practical security against differential attack, linear attack, cryptanalysis with impossible differential, truncated differential attack, and so on. Furthermore, E2 can be implemented efficiently and flexibly on various platforms because the primitive operations involve byte length processing.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Masayuki KANDA, Shiho MORIAI, Kazumaro AOKI, Hiroki UEDA, Youichi TAKASHIMA, Kazuo OHTA, Tsutomu MATSUMOTO, "E2--A New 128-Bit Block Cipher" in IEICE TRANSACTIONS on Fundamentals,
vol. E83-A, no. 1, pp. 48-59, January 2000, doi: .
Abstract: This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2, which was proposed to the AES (Advanced Encryption Standard) candidates. This algorithm supports 128-bit, 192-bit, and 256-bit secret keys. The design philosophy of E2 is highly conservative; the structure uses 12-round Feistel as its main function whose round function is constructed with 2-round SPN structure, and initial/final transformational functions. E2 has practical security against differential attack, linear attack, cryptanalysis with impossible differential, truncated differential attack, and so on. Furthermore, E2 can be implemented efficiently and flexibly on various platforms because the primitive operations involve byte length processing.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/e83-a_1_48/_p
Copy
@ARTICLE{e83-a_1_48,
author={Masayuki KANDA, Shiho MORIAI, Kazumaro AOKI, Hiroki UEDA, Youichi TAKASHIMA, Kazuo OHTA, Tsutomu MATSUMOTO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={E2--A New 128-Bit Block Cipher},
year={2000},
volume={E83-A},
number={1},
pages={48-59},
abstract={This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2, which was proposed to the AES (Advanced Encryption Standard) candidates. This algorithm supports 128-bit, 192-bit, and 256-bit secret keys. The design philosophy of E2 is highly conservative; the structure uses 12-round Feistel as its main function whose round function is constructed with 2-round SPN structure, and initial/final transformational functions. E2 has practical security against differential attack, linear attack, cryptanalysis with impossible differential, truncated differential attack, and so on. Furthermore, E2 can be implemented efficiently and flexibly on various platforms because the primitive operations involve byte length processing.},
keywords={},
doi={},
ISSN={},
month={January},}
Copy
TY - JOUR
TI - E2--A New 128-Bit Block Cipher
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 48
EP - 59
AU - Masayuki KANDA
AU - Shiho MORIAI
AU - Kazumaro AOKI
AU - Hiroki UEDA
AU - Youichi TAKASHIMA
AU - Kazuo OHTA
AU - Tsutomu MATSUMOTO
PY - 2000
DO -
JO - IEICE TRANSACTIONS on Fundamentals
SN -
VL - E83-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2000
AB - This paper describes the design principles, the specification, and evaluations of a new 128-bit block cipher E2, which was proposed to the AES (Advanced Encryption Standard) candidates. This algorithm supports 128-bit, 192-bit, and 256-bit secret keys. The design philosophy of E2 is highly conservative; the structure uses 12-round Feistel as its main function whose round function is constructed with 2-round SPN structure, and initial/final transformational functions. E2 has practical security against differential attack, linear attack, cryptanalysis with impossible differential, truncated differential attack, and so on. Furthermore, E2 can be implemented efficiently and flexibly on various platforms because the primitive operations involve byte length processing.
ER -