gptkbp:instanceOf
|
crypt
|
gptkbp:block
|
64 bits
|
gptkbp:category
|
gptkb:Symmetric-key_algorithm
|
gptkbp:citation
|
gptkb:C_language
|
gptkbp:countryOfOrigin
|
gptkb:Switzerland
|
gptkbp:designedBy
|
gptkb:James_Massey
Xuejia Lai
|
gptkbp:encryptionMode
|
gptkb:Cipher_Block_Chaining_(CBC)
gptkb:Cipher_Feedback_(CFB)
gptkb:Counter_(CTR)
gptkb:Electronic_Codebook_(ECB)
gptkb:Output_Feedback_(OFB)
|
gptkbp:fullName
|
International Data Encryption Algorithm
|
https://www.w3.org/2000/01/rdf-schema#label
|
IDEA cipher
|
gptkbp:introducedIn
|
1991
|
gptkbp:keySize
|
128 bits
|
gptkbp:notableFeature
|
Mixes XOR, addition, and multiplication operations
No known practical attacks
|
gptkbp:numberOfRounds
|
8.5
|
gptkbp:originalName
|
IPES (Improved Proposed Encryption Standard)
|
gptkbp:patent
|
Yes
|
gptkbp:patentExpired
|
Yes
|
gptkbp:standardizedBy
|
gptkb:ISO/IEC_18033-3
|
gptkbp:structure
|
gptkb:Substitution–permutation_network
|
gptkbp:successor
|
IDEA NXT
|
gptkbp:usedIn
|
gptkb:Pretty_Good_Privacy
|
gptkbp:vulnerableTo
|
Differential cryptanalysis
Key-schedule attacks (theoretical)
Linear cryptanalysis
|
gptkbp:bfsParent
|
gptkb:PGP_1.0
|
gptkbp:bfsLayer
|
8
|