Get started Bring yourself up to speed with our introductory content.

Block ciphers: REESSE3+ vs. International Data Encryption Algorithm

Expert Michael Cobb explains the difference between the REESSE3+ and IDEA block ciphers and explores when each is applicable in an enterprise setting.

What is the REESSE3+ block cipher, and how does it differ from IDEA? Is it a viable symmetric key cryptosystem...

to use in the enterprise?

The International Data Encryption Algorithm (IDEA) is a symmetric-key block cipher and has been around quite a while; it was first described in 1991.

Symmetric-key ciphers use the same key -- or secret -- for encrypting and decrypting data such as a message or file. Symmetric-key encryption can use either stream ciphers or block ciphers; a stream cipher encrypts data one bit at a time while a block cipher works on larger chunks or blocks of data, encrypting each block as a single unit.

IDEA operates on 64-bit blocks using a 128-bit key, and consists of a series of eight identical transformations (a "round") and an output transformation (a "half-round"). Other well-known block ciphers include AES, which works on 128-bit blocks, and Blowfish, which works on 64-bit blocks. Although IDEA is quite old now, it is still a highly regarded algorithm and is used in Pretty Good Privacy v2.0 and is an optional algorithm in the OpenPGP standard.

Truly widespread adoption of IDEA was hampered by the fact that it was only free for non-commercial use as it was patented in a number of countries. For example, the IDEA cipher suite has been removed from the TLS 1.2 standard not because of concerns over any weaknesses in the algorithm, but because most TLS implementations either do not support it, do not enable it by default or do not negotiate it when other algorithms such as AES are available. However, researchers in China have put forward a paper describing a block cipher based on IDEA called the REESSE3+ block cipher.

There are two obvious differences between IDEA and REESSE3+ that make the latter less susceptible to a brute force attack and ensure security when gigabytes of data are encrypted with a given key; the block length is extended to 128-bits from 64-bits, and the key length is extended to 256-bits from 128-bits.

Other changes are more complicated. The round function used in REESSE3+ has been updated and is more complex than that of IDEA, containing seven modular multiplications and seven modular additions. A round consists of various processing steps including substitution, transposition and mixing of the input plaintext to transform it into the final output of ciphertext. The more complex the round function is, the more efficiently the statistical structure of the plaintext is dispersed throughout the ciphertext -- diffusion. Despite the round function being more complex than IDEA's, the researchers claim the speed of encryption is improved by performing 26 operations -- not 28 -- per 128-bit block.

As computers become more powerful, older encryption algorithms become less secure; new algorithms that are open to public scrutiny and comment are always welcome. It is too soon to say whether REESSE3+ will become a widely accepted and used encryption algorithm, so enterprises should continue to use encryption standards that have wide industry approval (such as AES) and ensure systems are configured to use them correctly.

Finally, REESSE3+ is not the only algorithm to be based on IDEA. IDEA NXT has two configurations: NXT64 operates on 64-bit blocks using a 128-bit key and has 16 rounds, while the NXT128 operates on 125-bit blocks using a 256-bit key and also has 16 rounds.

Ask the Expert:
Have a question about application security? Send it via email today. (All questions are anonymous.)

Next Steps

Gain a further understanding of cryptography topics including algorithms, protocols, components and more

This was last published in July 2015

Dig Deeper on Disk Encryption and File Encryption



Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.