Grand Cru (cipher)

From Wikipedia, the free encyclopedia

Grand Cru
Designer(s): Johan Borst
First published: 2000
Derived from: Rijndael
Key size(s): 128 bits
Block size(s): 128 bits
Structure: Substitution-permutation network
Rounds: 10
This article is about the block cipher. For the wine classification, see Grand cru.

In cryptography, Grand Cru is a block cipher invented in 2000 by Johan Borst. It was submitted to the NESSIE project, but was not selected.

Grand Cru is a 10-round substitution-permutation network based largely on Rijndael (or AES). It replaces a number of Rijndael's unkeyed operations with key-dependent ones, in a way consistent with the security purposes of each operation. The intent is to produce a cipher at least as secure as Rijndael, and perhaps much more secure. The block size and key size are both 128 bits, and the key schedule is the same as Rijndael's.

Grand Cru is designed on the principle of multiple layered security. It is equivalent to a chain of 4 subciphers with independent keys, such that if 3 of the keys are known, the remaining cipher should still be secure.

[edit] References

Block ciphers
v  d  e
Algorithms: 3-Way | AES | Akelarre | Anubis | BaseKing | Blowfish | C2 | Camellia | CAST-128 | CAST-256 | Cobra | CMEA | Crab | CS-Cipher | DEAL | DES | DES-X | DFC | FEAL | FROG | G-DES | GOST | Grand Cru | Hasty Pudding Cipher | ICE | IDEA | IDEA NXT | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | Libelle | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | Mercy | MESH | MISTY1 | MMB | MULTI2 | NewDES | NOEKEON | NUSH | Q | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SC2000 | SEED | Serpent | SHACAL | SHARK | Skipjack | SMS4 | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential / Integral cryptanalysis | Mod n | Related-key | Slide | XSL
Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers