exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

mmb.txt

mmb.txt
Posted Dec 21, 1999

mmb.txt

tags | encryption
SHA-256 | a0aa5c8ee3723ad18a312bc2a0f801b692d98b2257e36a159553f7336ee3c673

mmb.txt

Change Mirror Download
From: Paulo Barreto <pbarreto@uninet.com.br>
Subject: Re: MMB? Maybe not...
Date: 9 Jun 1996 00:36:06 +0300

I've written about this to Bruce Schneier, but he's seemingly in Peru by now.
I had already read that, but here are some comments:

1. "MMB is dead [402]".
Reference [402] is J. Daemen's doctoral thesis, and he does NOT deem MMB
dead at all (take a look at
ftp://ftp.esat.kuleuven.ac.be/pub/COSIC/daemen/thesis). There's more:
Daemen believes the modular multiplication coefficients DO provide
resistance against linear cryptanalysis, although they were tailored to DC.
In my opinion, MMB is dead only in the sense that no implementation has been
widely available.

2. "Eli Biham has an effective chosen-key attack [160]".
Daemen quotes this personal communication too (hmm, why has it never been
published?) and suggests a very simple way to get rid of it (it's similar to
the trick to eliminate the weak keys of IDEA).

3. The errata to the 1st edition of AC says explicitly that MMB has been
broken. This may be a reference to Biham's attack, as that claim is not
repeated in the 2nd edition.

At last, what does "broken" mean anyway? Suppose Biham's attack reduces the
complexity of cryptanalyzing MMB from 2^128 to, say, 2^112. Would you say
MMB has been broken or simply weakened?

Well, I know it's a bit too early to do this, but here's my MMB
implementation. It's rather informal, but good for demonstration purposes.
It's completely public domain (and provided AS IS, without any warranty, you
know :-)

Have fun!
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close