Questions tagged [camellia]

Camellia is a 128-bit, symmetrical block cipher jointly developed by Mitsubishi and NTT of Japan.

Camellia is a 128-bit, symmetrical block cipher jointly developed by Mitsubishi and NTT of Japan. The Feistel cipher has security levels and processing abilities comparable to the Advanced Encryption Standard and has been approved for use by the ISO/IEC, the European Union's NESSIE project, and the Japanese CRYPTREC project.

21 questions
43
votes
3 answers

Why does nobody use (or break) the Camellia Cipher?

If Camellia is of equivalent security and speed to AES, concerns arise. First of all, assuming the above, why is Camellia so rarely used in practice? Why aren't there any breaks in Camellia? Does that mean that Camellia is currently more secure than…
Chris Smith
  • 1,202
  • 1
  • 11
  • 18
14
votes
1 answer

Why is CAMELLIA suddenly so widely used?

When nowadays I point my browser to https sites, the cipher that is on most occasions used is Camellia. My browsers (Chrome and Firefox) seem to prefer it, even when AES is available. Is that not kind of dangerous? Camellia did not receive so much…
MKK
  • 251
  • 2
  • 5
12
votes
4 answers

Do any non-US ciphers exist?

Plenty of ciphers come out of the USA from government research or selection competitions. AES and DES are examples. Are there any public ciphers produced by other states, China or Iran for example? Do you really think they trust AES? EDIT: List of…
user9070
5
votes
1 answer

HW acceleration for Camellia cipher (x86_64/AES-NI/AVX2)

Modern processors support hardware acceleration for various crypto functions such as AES directly, or general vector operations which can be used in crypto functions, such as SSE SSE2 SSSE3 AVX. On my machine, I can see the difference in speed…
5
votes
2 answers

Camellia or AES - which should I use?

Imagine I am a software developer. I want a block cipher, and I have the choice of using AES or Camellia. Which should I use? Which makes more sense from a technical perspective, and why? I need to select the preference order for TLS…
D.W.
  • 36,982
  • 13
  • 107
  • 196
4
votes
0 answers

Differential Path Search of a Block Cipher

Camellia Design and Analysis document refers to a paper: [24] M. Matsui, "Differential Path Search of the Block Cipher E2," (in Japanese), Technical report of IE- ICE, ISEC99-19, pp.57-64, The Institute of Electronics, Information and…
crypt
  • 2,522
  • 22
  • 33
3
votes
1 answer

Camellia cipher - is it a symmetric or asymmetric cipher?

I read a wiki page about Camellia cipher and know that it is a block cipher that can use 128-bit, 192-bit or 256-bit keys. But I cant find any information about if its a symmetric cipher (uses one key for both encryption and decryption) or…
3
votes
1 answer

Cryptographic algorithms comparison, AES vs Camellia

Which parameters should be used to compare AES vs Camellia? Their runtime ? The size of the encrypted data output?
alvaro vidal
  • 51
  • 1
  • 1
  • 3
3
votes
1 answer

Linear Approximation and Linear Probability of Camellia Sbox

In this article,Analysis of Camellia (para 2. Differential and linear cryptanalysis, page 3), it says The maximum bias of a linear approximation through one S-box is $2^{-4}$ , which gives a linear probability of $2^{-6}$ what does this mean?…
crypt
  • 2,522
  • 22
  • 33
3
votes
1 answer

Side Channel Attacks

How to make cipher resist against Side channel Attacks. Specially Timing Attack, Cachet Timing Attach, Simple/ Differential Power Analysis. Uptil now it seems all Standard Algorithms like AES, Cameillia etc have been successfully broken using side…
crypt
  • 2,522
  • 22
  • 33
3
votes
1 answer

Why Camellia has 4 Sbox

I asked a question about using 16 different Sboxes in AES each for one state byte instead of using same One Sbox for substituting 16 state bytes (See the Question Increase in AES SBox). The answers i got are like given below at least one…
crypt
  • 2,522
  • 22
  • 33
3
votes
1 answer

Countering Cryptographic Attacks

By reading Camellia Design and Analysis document following is my understanding about few cryptographic attacks from designer point of view. Differential and Linear Crypt-analysis. Number of Active S-boxes along-with the Differential and Linear…
crypt
  • 2,522
  • 22
  • 33
2
votes
1 answer

Correlation power analysis attack on Camellia

I'm investigating a correlation power analysis on a black-box ASIC I have. I want to learn about correlation analysis and it seems this ASIC implements Camellia. I searched for researches that did CPA on Camellia but it seems no-body did it. I have…
KHSX
  • 41
  • 4
2
votes
1 answer

Why Camellia paper declares that it is faster than Rijndael while it is actually much slower?

I'm writing an assignment on Camellia cipher. In the NTT paper, they declare a speed at least comparable with Rijndael, but, searching around, I found that it is actually much slower. I thought this may be caused by AES using specific CPU subsets,…
2
votes
2 answers

Camellia Key Schedule

Camellia is widely used, an international standard now. Its key schedule seems to be too simple compared to other famous ciphers like Twofish and CAST-256. What are the prerequisites for the key schedule, and does Camellia's key schedule have them?
crypt
  • 2,522
  • 22
  • 33
1
2