MISTY1

From Wikipedia, the free encyclopedia

MISTY redirects here. For other meanings, see Misty
MISTY1
Designer(s): Mitsubishi
First published: 1995
Successor(s): Camellia, MISTY2, KASUMI
Key size(s): 128 bits
Block size(s): 64 bits
Structure: Feistel network
Rounds: n (8 recommended)

In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. MISTY1 is one of the selected algorithms in the European NESSIE project, and has been recommended for Japanese government use by the CRYPTREC project. KASUMI is a strengthened version of the MISTY1 cipher and has been adopted as the standard encryption algorithm for European mobile phones. KASUMI is highly vulnerable to a cipher-text only attacks that allow GSM mobile phone conversations to be decrypted either in real-time, or at any later time.

"MISTY" can stand for "Mitsubishi Improved Security Technology", it is also the initials of the researchers involved in its development: Matsui Mitsuru, Ichikawa Tetsuya, Sorimachi Toru, Tokita Toshio, and Yamagishi Atsuhiro [1].

MISTY1 is covered by patents, although the algorithm is freely available for academic (non-profit) use. RFC2994.

Contents

[edit] Security

MISTY1 is a Feistel network with a variable number of rounds (any multiple of 4), though 8 are recommended. The cipher operates on 64-bit blocks and has a key size of 128 bits. MISTY1 has an innovative recursive structure. MISTY1 claims to be provably secure against linear and differential cryptanalysis.

In the paper, "Block Ciphers and Stream Ciphers" by Alex Biryukov, it is noted that KASUMI, also termed A5/3, is a strengthened version of block cipher MISTY1 running in a Counter mode.

[edit] See also

[edit] References

  • M. Matsui. Block encryption algorithm MISTY. In Fast Software Encryption, 4th International Workshop, FSE '97, LNCS 1267, pages 64–74. Springer, 1997.
  • Mitsuru Matsui. "Block encryption algorithm MISTY." Technical report of IEICE ISEC96-11 (1996-07). (In Japanese).
  • Alex Biryukov. "Block Ciphers and Stream Ciphers: The State of the Art", 2004, (PDF)
  • Elad Barkan, Eli Biham and Nathan Keller, Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, CRYPTO 2003, pp600–616 (PDF).

[edit] External links

Block ciphers
v  d  e
Algorithms: 3-Way | AES | Akelarre | Anubis | BaseKing | Blowfish | C2 | Camellia | CAST-128 | CAST-256 | CMEA | Cobra | Crab | CS-Cipher | DEAL | DES | DES-X | DFC | E2 | FEAL | FROG | G-DES | GOST | Grand Cru | Hasty Pudding Cipher | Hierocrypt | ICE | IDEA | IDEA NXT | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | Libelle | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | Mercy | MESH | MISTY1 | MMB | MULTI2 | NewDES | NOEKEON | NUSH | Q | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SC2000 | SEED | Serpent | SHACAL | SHARK | Skipjack | SMS4 | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential / Integral cryptanalysis | Mod n | Related-key | Slide | XSL
Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers
In other languages