MAGENTA: Difference between revisions
imported>Citation bot Removed parameters. | Use this bot. Report bugs. | Suggested by Abductive | #UCB_webform 151/3850 |
imported>Overvoltage m MAGENTA is broken according to the definition that a published attack exists that is computationally faster than brute force. The 1999 Biham paper "Cryptanalysis of Magenta" is that attack. |
||
| Line 61: | Line 61: | ||
[[Category:Deutsche Telekom]] | [[Category:Deutsche Telekom]] | ||
[[Category:Feistel ciphers]] | [[Category:Feistel ciphers]] | ||
[[Category:Broken block ciphers]] | |||
Latest revision as of 14:55, 20 June 2025
Template:Short description Script error: No such module "about". Template:Infobox block cipher
In cryptography, MAGENTA is a symmetric key block cipher developed by Michael Jacobson Jr. and Klaus Huber for Deutsche Telekom. The name MAGENTA is an acronym for Multifunctional Algorithm for General-purpose Encryption and Network Telecommunication Applications. (The color magenta is also part of the corporate identity of Deutsche Telekom.) The cipher was submitted to the Advanced Encryption Standard process, but did not advance beyond the first round; cryptographic weaknesses were discovered and it was found to be one of the slower ciphers submitted.[1]
MAGENTA has a block size of 128 bits and key sizes of 128, 192 and 256 bits. It is a Feistel cipher with six or eight rounds.
After the presentation of the cipher at the first AES conference, several cryptographers immediately found vulnerabilities.[2] These were written up and presented at the second AES conference (Biham et al., 1999).
References
- Script error: No such module "citation/CS1".