Solved

IDEA reasons for multiplication mod 2^16 + 1

Posted on 2004-09-27
3
418 Views
Last Modified: 2013-12-04
Hi.. i m not even sure if this is the correct place for this question or not...

but..

i was looking at the International Data Encryption Algorithm, and it has three vital parts to it are:

bit-by-bit exclusive-OR of two 16-bit sub-blocks

addition of integers modulo 2^16 where the 16-bit sub-block is treated as an unsigned integer

multiplication of integers modulo (2^16) + 1 where the 16-bit sub-block is treated as an unsigned integer except that the all-zero sub-block is treated as representing 2^16

why is it that in IDEA the addition is modulo 2^16 as opposed to say, (2^16) + 1 and why is multiplication (2^16)+1 as opposed to say 2^16?

Thanks,
0
Comment
Question by:sr11130107
  • 2
3 Comments
 
LVL 61

Expert Comment

by:gheist
ID: 12166623
Because 2^16+1 is prime number
0
 

Author Comment

by:sr11130107
ID: 12170939
well, yea. .but besides that trivial fact.. and then why is addition only 2^16..??

mabe it was just a design that suited it more. but was just curious..

if no more feedbakc, i'll motion for a delete..

thanks,
0
 
LVL 61

Accepted Solution

by:
gheist earned 50 total points
ID: 12172330
Mostly it is not used because it is heavily patented until 2011.
You are not cryptoanalyst as far as I see, basicaly multiplying by 2^n is same as bit shifting ( very simple to inverse )
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

937 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now