International Data Encryption Algorithm

Topics: Cryptography, Encryption, Block cipher Pages: 9 (2451 words) Published: September 20, 2011
International Data Encryption Algorithm

Fall 2004


How-Shen Chang

Table of Contents:

Description of IDEA3
Key Generation3
Modes of operation6
Weak keys for IDEA6


The Data Encryption Standard (DES) algorithm has been a popular secret key encryption algorithm and is used in many commercial and financial applications. Although introduced in 1976, it has proved resistant to all forms of cryptanalysis. However, its key size is too small by current standards and its entire 56 bit key space can be searched in approximately 22 hours [1]. International Data Encryption Algorithm (IDEA) is a block cipher designed by Xuejia Lai and James L. Massey of ETH-Zürich and was first described in 1991. It is a minor revision of an earlier cipher, PES (Proposed Encryption Standard); IDEA was originally called IPES (Improved PES). IDEA was used as the symmetric cipher in early versions of the Pretty Good Privacy cryptosystem. IDEA was to develop a strong encryption algorithm, which would replace the DES procedure developed in the U.S.A. in the seventies. It is also interesting in that it entirely avoids the use of any lookup tables or S-boxes. When the famous PGP email and file encryption product was designed by Phil Zimmermann, the developers were looking for maximum security. IDEA was their first choice for data encryption based on its proven design and its great reputation.

The IDEA encryption algorithm
• provides high level security not based on keeping the algorithm a secret, but rather upon ignorance of the secret key • is fully specified and easily understood
• is available to everybody
• is suitable for use in a wide range of applications
• can be economically implemented in electronic components (VLSI Chip) • can be used efficiently
• may be exported world wide
• is patent protected to prevent fraud and piracy

Description of IDEA

The block cipher IDEA operates with 64-bit plaintext and cipher text blocks and is controlled by a 128-bit key. The fundamental innovation in the design of this algorithm is the use of operations from three different algebraic groups. The substitution boxes and the associated table lookups used in the block ciphers available to-date have been completely avoided. The algorithm structure has been chosen such that, with the exception that different key sub-blocks are used, the encryption process is identical to the decryption process.

Key Generation

The 64-bit plaintext block is partitioned into four 16-bit sub-blocks, since all the algebraic operations used in the encryption process operate on 16-bit numbers. Another process produces for each of the encryption rounds, six 16-bit key sub-blocks from the 128-bit key. Since a further four 16-bit key-sub-blocks are required for the subsequent output transformation, a total of 52 (= 8 x 6 + 4) different 16-bit sub-blocks have to be generated from the 128-bit key. The key sub-blocks used for the encryption and the decryption in the individual rounds are shown in Table 1.


The 52 16-bit key sub-blocks which are generated from the 128-bit key are produced as follows:

• First, the 128-bit key is partitioned into eight 16-bit sub-blocks which are then directly used as the first eight key sub-blocks. • The 128-bit key is then cyclically shifted to the left by 25 positions, after which the resulting 128-bit block is again partitioned into eight 16-bit sub-blocks to be directly used as the next eight key sub-blocks. • The cyclic shift procedure described above is repeated until all of the required 52 16-bit key sub-blocks have been generated.


The functional representation of the encryption process is shown in Figure 1. The process consists of eight identical encryption steps (known as encryption rounds)...

Bibliography: [2] Ascom, IDEACrypt Coprocessor Data Sheet, 1999. ( Coprocessor.pdf).
[3]H. Bonnenberg, A. Curiger, N. Felber, H. Kaeslin, and X. Lai, “VLSI implementation of a new block cipher," in Proceedings of the IEEE International Conference on Computer Design: VLSI in Computer and Processors, pp. 501-513, 1991.
[4] J. Borst, L.R. Knudsen and V. Rijmen, Two Attacks on Reduced IDEA, Advances in Cryptology - EUROCRYPT 1997, Springer-Verlag (1992), pp. 1-13
[5] A
[6] J. Daemen, R. Govaerts, and J. Vandewalle, Weak keys for IDEA, Advances in Cryptology - Crypto '93, Springer-Verlag (1994), pp. 224-231
[7] X
[8] M.P. Leong, O.Y.H. Cheung, K.H. Tsoi and P.H.W. Leong,
“A Bit-Serial Implementation of the International Data Encryption Algorithm IDEA,” 2000 IEEE Symposium on Field-Programmable Custom Computing Machines, IEEE (2000), pp
[9] S. L. C. Salomao, V. C. Alves, and E. M. C. Filho, “HiPCrypto: A high-performance VLSI cryptographic chip," in Proceedings of the Eleventh Annual IEEE ASIC Conference, pp. 7-11, 1998.
[10] S. Wolter, H. Matz, A. Schubert, and R. Laur, “On the VLSI implementation of the international data encryption algorithm IDEA," in Proceedings of the IEEE International Symposium on Circuits and Systems, vol. 1, pp. 397-400, 1995.
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Data Encryption Essay
  • Enhanced Data Encryption Algorithm for Next Generation Networks Essay
  • Data Encryption Standard Essay
  • Comparing Encryption Algorithms Essay
  • Essay on Implementation of Advanced Encryption Standard Algorithm
  • Data Encryption Essay
  • Data Encryption with Ecc Essay
  • A Data Hiding Algorithm Using Steganography Essay

Become a StudyMode Member

Sign Up - It's Free