• Aucun résultat trouvé

International Data Encryption Algorithm

N/A
N/A
Protected

Academic year: 2022

Partager "International Data Encryption Algorithm"

Copied!
2
0
0

Texte intégral

(1)

1

The IDEA data encryption algorithm...

–provides high level security not based on keeping the algorithm a secret, but rather upon ignorance of the secret key –is fully specified and easily understood –is available to everybody

–is suitable for use in a wide range of applications

–can be economically implemented in electronic components (VLSI chip) –can be used efficiently

–may be exported worldwide –is strong, small and fast

IDEA is the name of the patented and universally applicable block encryption algorithm, which permits the effective protection of transmitted and stored data against unauthorized access by third parties. With a key of 128 bits in length, IDEA is far more secure than the widely known DES based on a 56-bit key. The fundamen- tal criteria for the development of IDEA were military strength for all security requirements and easy hardware and software imple- mentation. The algorithm is used worldwide in various banking and industry applications. They predestine the algorithm for use in a great number of commercial applications.

IDEA algorithm

The IDEA algorithm was developed in a joint project involving the Swiss Federal Institute of Technology in Zurich and Ascom.

The aim of the project was to develop a strong encryption algo- rithm, which would replace the DES procedure developed in the U.S.A. in the seventies.

International Data

Encryption Algorithm

(2)

2

M E D I A C R Y P T A G | T E C H N O P A R K S T R A S S E 1 | 8 0 0 5 Z U R I C H S W I T Z E R L A N D T E L . + 4 1 4 4 4 4 5 3 0 7 0 | F A X + 4 1 4 4 4 4 5 3 0 7 1 | W W W . M E D I A C R Y P T . C O M MediaCrypt and the IDEA logo are trademarks

of MediaCrypt AG, Switzerland.

IDEA is a trademark of Ascom AG, Switzerland.

Copyright 2004 by MediaCrypt AG Factsheet IDEA_0304

Data protection by means of encryption As electronic communications grow in im- portance, there is also an increasing need for data protection. Encryption ensures that:

–Only authorized persons can access infor- mation.

–Data cannot be amended or manipulated by unauthorized persons.

–Unbreakable crypt system warrants mili- tary strength security level.

IDEA solutions

When PGP (Pretty Good Privacy) was de- signed, the developers were looking for maximum security. IDEA was their first choice for data encryption based on its proven design and its great reputation.

Today, there are hundreds of IDEA-based security solutions available.

IDEA registration in standards –ISO 9979/002: ISO Register of Crypto-

graphic Algorithms

–UN/EDIFACT: EDIFACT Security Imple- mentation Guidelines

–ITU-T Recommendation H.233: Confiden- tiality System for Audiovisual Services –IETF RFC 3058: Use of the IDEA Encryp-

tion Algorithm in CMS

–TBSS: Telematic Base Security Services –OpenSSL Cryptographic Library –WAP Wireless Transport Layer Security –NESSIE (New European Schemes for

Signature, Integrity, and Encryption):

Call for Cryptographic Primitives – finalist

Submitted to:

–ISO NP 18033: Encryption algorithms

Applications

The IDEA algorithm can easily be embedded in any encryption software.

Data encryption can be used to protect data transmission and storage. Typical fields are:

–Audio and video data for cable TV, pay TV, video conferencing, distance learning, business TV, VoIP

–Sensitive financial and commercial data –Email via public networks

–Transmission links via modem, router or ATM link, GSM technology

–Smart cards

Hardware

The IDEA crypt-kernel is the right choice whenever maximum security combined with high-speed performance is demanded. This kernel features extraordinary encryption/

decryption performance in the range of 7 Gbit/s and is designed for any kind of hardware implementation.

IDEA International Data Encryption Algorithm

Our products and services

–IDEA algorithm in ANSI C/C++, and Java code

–Crypto toolkit for optimized implementa- tion of IDEA into products

–IDEA crypt-kernel

–Security consulting/engineering for secure data, voice and video communication solutions

How secure is IDEA

It would take one billion computers testing one billion combinations per second, 10'000 billion years to crack the code (2128 vari- ants) - longer than the universe has existed.

Licenses

Companies wishing to deploy the IDEA algo- rithm on a commercial basis can obtain a license in return for a small fee. There are several types of licenses available.

Additional licensing information is available on our web page at: www.mediacrypt.com

...at a glance Strong, small, fast

Resistant against all known crypto attacks Available worldwide

Patent protection EU: 0 482 154 B1 US: 5,214,703 JP: 3,225,440 B2

Références

Documents relatifs

(The AES is a new symmetric- based encryption standard under development by NIST. AES is intended to provide strong cryptographic security for the protection of sensitive

In addition, during the development of RC5, we began to focus our atten- tion on a intriguing new cryptographic primitive: data-dependent rotations , in which one word of

We discussed the global, constant, and texture memory as an option for the location of the lookup tables7. According to the experiments, the best results were obtained when

We will from now on set ourselves in the context of early termination in the block Wiedemann algorithm. We have three candidate algorithms for order basis in block Wiede- mann

In this paper, we show a direct equivalence between the embedding computed in spectral clustering and the mapping computed with kernel PCA, and how both are special cases of a

Our second attack shows that when random nonces are used and when the length of the associated data is missing, 2 ℓ/2 encryption queries allows to forge a valid encrypted message

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des

Figure 11: Summary of the proper preprocessing choice to deal with three particular boundaries (top boundary with a global force information, cluster of missing data and