[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
An Extended Version of My Encryption Algorithm WEAK3
I have done a trial implementation of a number of suggestions received
for improving my encryption algorithm WEAK3 and have decided to
integrate a subset of these into WEAK3 to form an extended version of
it designated WEAK3-E. The added features are the following:
1. Text block chaining. Two options are provided. These are similar
though not identical to the block chaining methods PBC and CBCC
as described in B. Schneier's book.
2. Another block chaining method that is specific to our scheme. It
consists in modifying, depending on the text being processed, the
pointers that are used to access the various pseudo-randomly
generated tables of the algorithm.
3. All pseudo-randomly generated tables used in the algorithm can now
be refreshed at user specified periods.
4. Checksums of the chaining values in (1) and (2) above are output
to provide integrity checking.
An implementation in Fortran 90 is available in:
http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper12
The rationales of design of the base version, WEAK3, are given in
http://www.stud.uni-muenchen.de/~mok-kong.shen/#paper11
The implemented new features largely follow the suggestions of CWL.
I like also to thank GR and CK for construcive critiques and TPS for
validating the program code. All eventual remaining deficiencies and
errors are however exclusively mine.
A binary executable file for PC may be downloaded through:
http://www.stud.uni-muenchen.de/~mok-kong.shen/#software
Critiques comments and suggestions for improvements are sincerely
solicited.
M. K. Shen