[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

IDEA reasons for multiplication mod 2^16 + 1

Posted on 2004-09-27
3
Medium Priority
?
446 Views
Last Modified: 2013-12-04
Hi.. i m not even sure if this is the correct place for this question or not...

but..

i was looking at the International Data Encryption Algorithm, and it has three vital parts to it are:

bit-by-bit exclusive-OR of two 16-bit sub-blocks

addition of integers modulo 2^16 where the 16-bit sub-block is treated as an unsigned integer

multiplication of integers modulo (2^16) + 1 where the 16-bit sub-block is treated as an unsigned integer except that the all-zero sub-block is treated as representing 2^16

why is it that in IDEA the addition is modulo 2^16 as opposed to say, (2^16) + 1 and why is multiplication (2^16)+1 as opposed to say 2^16?

Thanks,
0
Comment
Question by:sr11130107
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 12166623
Because 2^16+1 is prime number
0
 

Author Comment

by:sr11130107
ID: 12170939
well, yea. .but besides that trivial fact.. and then why is addition only 2^16..??

mabe it was just a design that suited it more. but was just curious..

if no more feedbakc, i'll motion for a delete..

thanks,
0
 
LVL 62

Accepted Solution

by:
gheist earned 200 total points
ID: 12172330
Mostly it is not used because it is heavily patented until 2011.
You are not cryptoanalyst as far as I see, basicaly multiplying by 2^n is same as bit shifting ( very simple to inverse )
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question