MESH (cipher)

From Wikipedia, the free encyclopedia

MESH
Designer(s): Nakahara, Rijmen, Preneel, Vandewalle
First published: 2002
Derived from: IDEA
Key size(s): 128, 192, or 256 bits
Block size(s): 64, 96, or 128 bits
Structure: Substitution-permutation network
Rounds: 8.5, 10.5, or 12.5

In cryptography, MESH is a block cipher designed in 2002 by Jorge Nakahara, Jr., Vincent Rijmen, Bart Preneel, and Joos Vandewalle. MESH is based directly on IDEA and uses the same basic operations.

MESH is actually a family of 3 variant ciphers with block sizes of 64, 96, and 128 bits. The key is twice the length of the block. The number of rounds is 8.5, 10.5, or 12.5, depending on the block size. The algorithm uses a substitution-permutation network based on IDEA's, but with a larger round structure, or "MA-box". MESH also has a more complex key schedule than IDEA, intended to prevent weak keys and other insecure patterns in subkeys.

[edit] References

  • J. Nakahara, Jr, V. Rijmen, B. Preneel, and J. Vandewalle. The MESH Block Ciphers. COSIC Tech Report, 2002. (PDF)
Block ciphers
v  d  e
Algorithms: 3-Way | AES | Akelarre | Anubis | BaseKing | Blowfish | C2 | Camellia | CAST-128 | CAST-256 | Cobra | CMEA | Crab | CS-Cipher | DEAL | DES | DES-X | DFC | FEAL | FROG | G-DES | GOST | Grand Cru | Hasty Pudding Cipher | ICE | IDEA | IDEA NXT | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | Libelle | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | Mercy | MESH | MISTY1 | MMB | MULTI2 | NewDES | NOEKEON | NUSH | Q | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SC2000 | SEED | Serpent | SHACAL | SHARK | Skipjack | SMS4 | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential / Integral cryptanalysis | Mod n | Related-key | Slide | XSL
Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers