Abstract
This paper describes BEAST, a new blockcipher for arbitrary size blocks. It is a Luby-Rackoff cipher and fast when the blocks are large. BEAST is assembled from cryptographic hash functions and stream ciphers. It is provably secure if these building blocks are secure.
For smartcard applications, a variant BEAST-RK is proposed, where the bulk operations can be done by the smartcard’s host without knowing the key. Only fast key-dependent operations remain to be done by the smartcard.
Chapter PDF
Similar content being viewed by others
References
R. Anderson (1993) The Classification of Hash Functions, in Fourth IMA conference on cryptography and coding, 83–93.
R. Anderson, E. Biham (1996) Two Practical and Provably Secure Block Ciphers: BEAR and LION, in Fast Software Encryption (ed. D. Gollmann ), Springer LNCS 1039, 113–120.
M. Blaze (1996) High-Bandwidth Encryption with Low-Bandwidth Smartcards, in Fast Software Encryption (ed. D. Gollmann ), Springer LNCS 1039, 33–40.
M. Luby, C. Rackoff (1988) How to construct pseudorandom permutations from pseudorandom functions, SIAM J. Computing, Vol. 17, No. 2, 373–386.
S. Lucks (1996) Faster Luby-Rackoff Ciphers, in Fast Software Encryption (ed. D. Goll-mann ), Springer LNCS 1039, 189–203.
U. Maurer (1992) A Simplified and Generalized Treatment of Luby-Rackoff Pseudorandom Permutation Generators, in EuroCrypt ’82 (ed. R. Rueppel ), Springer LNCS 658, 239–255.
P. Rogaway, D. Coppersmith (1993) A Software-Optimized Encryption Algorithm, in Fast Software Encryption (ed. R. Anderson ), Springer LNCS 809, 56–63.
M. Roe (1994) Performance of Block Ciphers and Hash Functions–One Year Later, in Fast Software Encryption (ed. B. Preneel ), Springer LNCS 1008, 359–362.
B. Schneier (1995) Applied Cryptography Wiley.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1996 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Lucks, S. (1996). BEAST: A fast block cipher for arbitrary blocksizes. In: Horster, P. (eds) Communications and Multimedia Security II. IFIP Advances in Information and Communication Technology. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35083-7_13
Download citation
DOI: https://doi.org/10.1007/978-0-387-35083-7_13
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-5041-2931-2
Online ISBN: 978-0-387-35083-7
eBook Packages: Springer Book Archive