This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "BEAR and LION ciphers" – news · newspapers · books · scholar · JSTOR(October 2017) (Learn how and when to remove this message)
The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipher and a cryptographic hash function. The algorithms use a very large variable block size, on the order of 213 to 223 bits or more[clarify]. Both are 3-round generalized (alternating) Feistel ciphers,[1] using the hash function and the stream cipher as round functions. BEAR uses the hash function twice with independent keys, and the stream cipher once. LION uses the stream cipher twice and the hash function once. The inventors proved that an attack on either BEAR or LION that recovers the key would break both the stream cipher and the hash.
The BEARandLION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipherand a cryptographic hash function. The algorithms...
ciphers. Examples of such block ciphers are BEARandLION. Cipher security summary Topics in cryptography XOR cipher Cusick, Thomas W.; Stanica, Pantelimon...
Block ciphers may be capable of operating on more than one block size, but during transformation the block size is always fixed. Block cipher modes operate...
cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...
are a known security issue for stream ciphers, which makes IV loading in stream ciphers a serious concern and a subject of ongoing research. The 802...
stream cipher. Block ciphers can be used as stream ciphers by generating blocks of a keystream (in place of a Pseudorandom number generator) and applying...
product cipher that uses only substitutions and permutations is called a SP-network. Feistel ciphers are an important class of product ciphers. Handbook...
ISBN 978-3-540-53587-4. Lai, Xuejia; Massey, James L.; Murphy, Sean (1991). "Markov Ciphersand Differential Cryptanalysis". Advances in Cryptology — EUROCRYPT '91....
Jakobsen, L.R. Knudsen (January 1997). The Interpolation Attack on Block Ciphers (PDF/PostScript). 4th International Workshop on Fast Software Encryption...
example, the pseudo-Hadamard transform (PHT) from the SAFER family of ciphers. Twofish has a Feistel structure like DES. Twofish also employs a Maximum...
KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems. In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms...
cryptography, the Iraqi block cipher was a block cipher published in C source code form by anonymous FTP upload around July 1999, and widely distributed on Usenet...
discovered and it was found to be one of the slower ciphers submitted. MAGENTA has a block size of 128 bits and key sizes of 128, 192 and 256 bits. It...
denied any role in the design or selection of the algorithm. The ECMEA and SCEMA ciphers are derived from CMEA. CMEA is described in U.S. patent 5,159,634...