KHAZAD

Block cipher


title: "KHAZAD" type: doc version: 1 created: 2026-02-28 author: "Wikipedia contributors" status: active scope: public tags: ["block-ciphers", "free-ciphers"] description: "Block cipher" topic_path: "technology/cryptography" source: "https://en.wikipedia.org/wiki/KHAZAD" license: "CC BY-SA 4.0" wikipedia_page_id: 0 wikipedia_revision_id: 0

::summary Block cipher ::

::data[format=table title="Infobox block cipher"]

FieldValue
nameKhazad
designersVincent Rijmen and Paulo S. L. M. Barreto
publish date2000
derived fromSHARK
key size128 bits
block size64 bits
structureSubstitution–permutation network
rounds8
cryptanalysisNo attack better than on the first five rounds is known.
::

| name = Khazad | designers = Vincent Rijmen and Paulo S. L. M. Barreto | publish date = 2000 | derived from = SHARK | key size = 128 bits | block size = 64 bits | structure = Substitution–permutation network | rounds = 8 | cryptanalysis = No attack better than on the first five rounds is known.

In cryptography, KHAZAD is a block cipher designed by Paulo S. L. M. Barreto together with Vincent Rijmen, one of the designers of the Advanced Encryption Standard (Rijndael). KHAZAD is named after Khazad-dûm, the fictional dwarven realm in the writings of J. R. R. Tolkien (see also Khazad). KHAZAD was presented at the first NESSIE workshop in 2000, and, after some small changes, was selected as a finalist in the project.

KHAZAD has an eight-round substitution–permutation network structure similar to that of SHARK, a forerunner to Rijndael. The design is classed as a "legacy-level" algorithm, with a 64-bit block size (in common with older ciphers such as DES and IDEA) and a 128-bit key. KHAZAD makes heavy use of involutions as subcomponents; this minimises the difference between the algorithms for encryption and decryption.

The authors have stated that, "KHAZAD is not (and will never be) patented. It may be used free of charge for any purpose."

Frédéric Muller has discovered an attack which can break five of KHAZAD's eight rounds. No attacks better than this are known as of August 2009.

References

  • {{cite conference | author = Frédéric Muller | title = A New Attack against Khazad | conference = Advances in Cryptology – ASIACRYPT 2003 | pages = 347–358 | publisher = Springer-Verlag | date = December 2003 | location = Taipei | citeseerx = 10.1.1.108.7998 | doi = 10.1007/978-3-540-40061-5_22 | url = https://link.springer.com/chapter/10.1007/978-3-540-40061-5_22#preview

::callout[type=info title="Wikipedia Source"] This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page. ::

block-ciphersfree-ciphers