1997 Entrust Technologies
Orchestrating Enterprise Security
CAST-256 A Submission for the Advanced Encryption Standard - - PowerPoint PPT Presentation
CAST-256 A Submission for the Advanced Encryption Standard Carlisle Adams First AES Candidate Conference August 20-22, 1998 Orchestrating Enterprise Security 1997 Entrust Technologies Vital Statistics ! Name CAST-256 ! Inventors
1997 Entrust Technologies
Orchestrating Enterprise Security
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
+ k0 L R L R L R + k1
Orchestrating Enterprise Security
1997 Entrust Technologies
+ k0 L R L R L R + k1 + k0 + k1 + k2 B C A A B C C A B B C A
Orchestrating Enterprise Security
1997 Entrust Technologies
+ k0 L R L R L R + k1 + k0 + k1 + k2 + k0 + k1 + k2 B C A A B C C A B B C A B C A D A B D C D A C B C D B A + k3 B C A D
Orchestrating Enterprise Security
1997 Entrust Technologies
+ k0 + k1 + k2 B C A D A B D C D A C B C D B A + k3 B C A D
C C f D k k B B f C k k A A f B k k D D f A k k
r i m i r i m i r i m i r i m i
= ⊕ = ⊕ = ⊕ = ⊕
1 2 3 1
1 1 2 2 3 3
( , , ) ( , , ) ( , , ) ( , , )
( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )
D D f A k k A A f B k k B B f C k k C C f D k k
r i m i r i m i r i m i r i m i
= ⊕ = ⊕ = ⊕ = ⊕
1 3 2 1
3 3 2 2 1 1
( , , ) ( , , ) ( , , ) ( , , )
( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )
β β ← Qi ( ) β β ← Qi ( )
“Forward Quad-Round” “Reverse Quad-Round”
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
+ 2 2 1 i i r i m i
( ) ( )
G G f H t t F F f G t t E E f F t t D D f E t t C C f D t t B B f C t t A A f B t
r i m i r i m i r i m i r i m i r i m i r i m i r i
= ⊕ = ⊕ = ⊕ = ⊕ = ⊕ = ⊕ = ⊕
1 2 3 1 2 3 1
1 1 2 2 3 3 4 4 5 5 6
( , , ) ( , , ) ( , , ) ( , , ) ( , , ) ( , , ) ( ,
( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ),
) ( , , )
( ) ( ) ( )
t H H f A t t
m i r i m i
6 7 7
2
= ⊕
i( ){
Orchestrating Enterprise Security
1997 Entrust Technologies
m m r r
30 16 30 16
m i m m m m r i r r r r
j j
( ) ( )
32
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies
Orchestrating Enterprise Security
1997 Entrust Technologies