From: rscott@falcon.ic.net (Robert Scott)
Newsgroups: sci.crypt
Subject: Revision of NEWDES
Date: 2 Mar 1996 21:47:53 GMT
Organization: ICNet ... Your Link to the Internet ... 313-998-0090
Lines: 164
Message-ID: <4hafm9$r51@condor.ic.net>
NNTP-Posting-Host: falcon.ic.net
X-Newsreader: TIN [version 1.2 PL2]


                         Revision of NEWDES

                              -by Robert Scott 

When I designed NEWDES in 1984-1985, I had a very simple key 
expansion.  I expanded 15 bytes of key into 60 bytes by repeating 
the 15 bytes four times.  It now appears that such a simple key 
expansion creates a vulnerability to a related-key attack.  In a 
related-key attack the attacker uses the fact that if the key is 
changed to a related key, there is some information he has about the 
resulting ciphertext without actually running the entire encryption 
algorithm.  In the case of NEWDES, this information comes from the 
fact that if the 15-byte key is rotated seven bytes, the expanded 
60-byte key is also rotated seven bytes, which is exactly two
round's worth of key.  Therefore the encryption algorithm using the 
rotated key does 17 rounds where the last 15 rounds are the same as 
the first 15 rounds using the un-rotated key.

I therefore would like to revise my NEWDES algorithm to add a good 
key expansion algorithm.  This will be done in keeping with the 
original design goals, which were: 

   1. open design - no hidden structure
   2. simple and fast software implementation
   3. functional replacement for DES with more security

My first inclination was to simply re-order the 15 key bytes as they 
are used in the expansion.  This would break the pattern of having a 
rotation of seven bytes causing the same key bytes to appear in 
similar positions in the encryption.  Such an expansion would not 
incur any additional delay in a hardware implementation since only 
the ordering of the expanded key bytes would be changed.  However, 
upon more reflection, the risk of making such a minimal change was 
too great.  There may be more complex related key attacks.  

My next thought was to ensure that all 60 bytes of expanded key are 
potentially different.  A simple way to do this is to form each of 
the 60 bytes of expanded key as the exclusive-or of an original key 
byte and one of four other bytes.  For these other four bytes I 
have chosen 0 and three of the 15 key bytes.  Specifically, if 
K0...K14 are the 15 key bytes, then the 60 expanded key bytes would 
be 

  K0       K1       K2       . . . . K13       K14   
  K0^K7    K1^K7    K2^K7    . . . . K13^K7    K14^K7 
  K0^K8    K1^K8    K2^K8    . . . . K13^K8    K14^K8 
  K0^K9    K1^K9    K2^K9    . . . . K13^K9    K14^K9 

where '^' denotes exclusive-or.  I am aware of the fact that there 
are three zeros in this list of 60 bytes.  However, this does not 
weaken the algorithm.  The zeroes occur in single instances of what 
used to be K7, K8, and K9.  However, these key bytes appear more 
than any others in the total list, so they can afford to miss one 
showing apiece.

The following C-code can be used to implement this revised version 
of NEWDES.  By the way, the algorithm uses a permutation on bytes 
called the f-function.  This function is given in tabular form 
within the following C-code.  But if anyone would like to verify or 
generate the randomizing permutation, f, as described in the 
original Cryptologia article, please e-mail me and I will e-mail you 
the C-code to generate the f-function, together with my 
transcription of the Declaration of Independence on which the f-
function is based. 


/* newdes.c  -  Revised 3-2-96 to include better key expansion */
/*           -  Released to the public domain by Robert Scott  */
/*           -  Originally published in Cryptologia, Jan. 1985 */

static char f[256] = {
 32,137,239,188,102,125,221,72,212,68,81,37,86,237,147,149,
 70,229,17,124,115,207,33,20,122,143,25,215,51,183,138,142,
 146,211,110,173,1,228,189,14,103,78,162,36,253,167,116,255,
 158,45,185,50,98,168,250,235,54,141,195,247,240,63,148,2,
 224,169,214,180,62,22,117,108,19,172,161,159,160,47,43,171,
 194,175,178,56,196,112,23,220,89,21,164,130,157,8,85,251,
 216,44,94,179,226,38,90,119,40,202,34,206,35,69,231,246,
 29,109,74,71,176,6,60,145,65,13,77,151,12,127,95,199,
 57,101,5,232,150,210,129,24,181,10,121,187,48,193,139,252,
 219,64,88,233,96,128,80,53,191,144,218,11,106,132,155,104,
 91,136,31,42,243,66,126,135,30,26,87,186,182,154,242,123,
 82,166,208,39,152,190,113,205,114,105,225,84,73,163,99,111,
 204,61,200,217,170,15,198,28,192,254,134,234,222,7,236,248,
 201,41,177,156,92,131,67,249,245,184,203,9,241,0,27,46,
 133,174,75,18,93,209,100,120,76,213,16,83,4,107,140,52,
 58,55,3,244,97,197,238,227,118,49,79,230,223,165,153,59};

char B0,B1,B2,B3,B4,B5,B6,B7;
char Key[15];

/* The following code acts on the block B0...B7
   using Key[0]...Key[14] */

encrypt()
{
        int i;
        char ex;
    ex = 0;
    i = 0;
    while(1)
    {
        B4 = B4 ^ f[B0 ^ Key[i] ^ ex];
        if(++i==15) {i = 0;  ex = Key[7];}
        B5 = B5 ^ f[B1 ^ Key[i] ^ ex];
        if(++i==15) {i = 0;  ex = Key[8];}
        B6 = B6 ^ f[B2 ^ Key[i] ^ ex];
        if(++i==15) {i = 0;  ex = Key[9];}
        B7 = B7 ^ f[B3 ^ Key[i] ^ ex];
        if(++i==15) return;

        B1 = B1 ^ f[B4 ^ Key[i++] ^ ex];
        B2 = B2 ^ f[B4 ^ B5];
        B3 = B3 ^ f[B6 ^ Key[i++] ^ ex];
        B0 = B0 ^ f[B7 ^ Key[i++] ^ ex];
      }
}

decrypt()
{
        int i;
        char ex;
    ex = Key[9];
    i = 14;
    while(1)
    {
        B7 = B7 ^ f[B3 ^ Key[i] ^ ex];
        if(--i<0) {i = 14;  ex = Key[8];}
        B6 = B6 ^ f[B2 ^ Key[i] ^ ex];
        if(--i<0) {i = 14;  ex = Key[7];}
        B5 = B5 ^ f[B1 ^ Key[i] ^ ex];
        if(--i<0) {i = 14;  ex = 0;}
        B4 = B4 ^ f[B0 ^ Key[i] ^ ex];

        if(--i<0) return;

        B0 = B0 ^ f[B7 ^ Key[i--] ^ ex];
        B3 = B3 ^ f[B6 ^ Key[i--] ^ ex];
        B2 = B2 ^ f[B4 ^ B5];
        B1 = B1 ^ f[B4 ^ Key[i--] ^ ex];
    }
}

/* Notes:

     The original NEWDES algorithm was vulnerable to a related-key 
attack using a large number of chosen plaintexts.  The weakness was 
due to the simple key expansion algorithm which made key rotation by 
seven bytes cause the last 15 rounds to be the same as the first 15 
rounds using the un-rotated key.  The revised key expansion uses 
the 15 key bytes exclusive-ored with 0, 1, 2 and 3 to generate 60 
unique bytes of expanded key.

     The original C-language representation of the algorithm used a 
single function to do both encryption and decryption, the difference 
being in the setting of three global variables.  Even though the 
idea could be extended to include this new key expansion algorithm, 
it seemed that the benefits of streamlined encrypt() and decrypt() 
functions now outweigh the advantages using only one function.  Note 
that the algorithm could run even faster if the 60-byte expanded key 
were pre-computed in an array.
*/