SC2000

From Wikipedia, the free encyclopedia


SC2000
Designer(s): Fujitsu
First published: 2000
Key size(s): 128, 192, or 256 bits
Block size(s): 128 bits
Structure: combination SPN and Feistel network
Rounds: 6.5 or 7.5
Best public cryptanalysis:
Differential and linear attacks exist against SC2000 reduced to 4.5 rounds

In cryptography, SC2000 is a block cipher invented by a research group at Fujitsu Labs. It was submitted to the NESSIE project, but was not selected. SC2000 is one of the cryptographic techniques recommended for Japanese government use by CRYPTREC.

The algorithm uses a key size of 128, 192, or 256 bits. It operates on blocks of 128 bits using 6.5 or 7.5 rounds of encryption. Each round consists of S-box lookups, key additions, and an unkeyed two-round Feistel network.

No analysis of the full SC2000 has been announced, but a reduced-round variant of 4.5 rounds is susceptible to both differential and linear cryptanalysis.

[edit] References

  • Lars Knudsen and Håvard Raddum, A first report on Whirlpool, NUSH, SC2000, Noekeon, Two-Track-MAC and RC6, (PDF)
  • Hitoshi Yanami, Takeshi Shimoyama, and Orr Dunkelman, Differential and Linear Cryptanalysis of a Reduced-Round SC2000, Proceedings of Second Open NESSIE Workshop, (PDF)
Block ciphers
v  d  e
Algorithms: 3-Way | AES | Akelarre | Anubis | BaseKing | Blowfish | C2 | Camellia | CAST-128 | CAST-256 | CMEA | Cobra | Crab | CS-Cipher | DEAL | DES | DES-X | DFC | E2 | FEAL | FROG | G-DES | GOST | Grand Cru | Hasty Pudding Cipher | Hierocrypt | ICE | IDEA | IDEA NXT | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | Libelle | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | Mercy | MESH | MISTY1 | MMB | MULTI2 | NewDES | NOEKEON | NUSH | Q | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SC2000 | SEED | Serpent | SHACAL | SHARK | Skipjack | SMS4 | Square | TEA | Triple DES | Twofish | XTEA
Design: Feistel network | Key schedule | Product cipher | S-box | SPN   Attacks: Brute force | Linear / Differential / Integral cryptanalysis | Mod n | Related-key | Slide | XSL
Standardization: AES process | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers