This page uses content from Wikipedia and is licensed under CC BY-SA.
General | |
---|---|
Designers | Burt Kaliski, Matt Robshaw |
First published | 1993 |
Derived from | MD5 |
Related to | SHACAL |
Cipher detail | |
Key sizes | 80 bits |
Block sizes | 8192 bits |
Structure | Cryptographic hash function |
Best public cryptanalysis | |
Proposed differential cryptanalysis using no more than 2^{16} chosen plaintexts |
In cryptography, Crab is a block cipher proposed by Burt Kaliski and Matt Robshaw at the first Fast Software Encryption workshop in 1993. Not really intended for use, Crab was developed to demonstrate how ideas from hash functions could be used to create a fast cipher.
Crab has an unusually large block size of 8192 bits. Its creators suggested using an 80-bit key, but the cipher could use any key size. The authors didn't specify an actual key schedule, only that the key is used to generate two large sets of subkeys: a permutation of the numbers 0 through 255, and an array of 2048 32-bit numbers. The block is divided into 256 32-bit subblocks, which are permuted at the beginning. Then the algorithm makes four passes over the data, each time applying one of four transformations adapted from MD5.
A brief note on the cryptanalysis of Crab is included in Markku-Juhani Saarinen's paper on block ciphers based on SHA-1 and MD5, published at FSE 2003. The author demonstrates a weakness in Crab that permits a distinguisher using no more than a dozen chosen plaintexts, and speculates that this can be converted into a full key-recovery attack using no more than 2^{16} chosen plaintexts. Such an attack would depend on the key schedule used.
This cryptography-related article is a stub. You can help Wikipedia by expanding it. |