9. Analysis of NESSIE project cryptographic algorithms¶
The NESSIE call includes a request for a broad set of algorithms providing date confidentiality, data authentication, and entity authentication. These algorithms include block ciphers, stream ciphers, hash functions, MAC algorithms, digital signature schemes, and public-key encryption and identification schemes. In this chapter, several cryptographic algorithms from NESSIE (New European Schemes for Signature, Integrity, and Encryption) research project candidates are analysed.
Below you can find a legend describing the cryptographic criteria used in this chapter:
NL | Nonlinearity |
NL2 | 2-nd order nonlinearity |
LD | Linearity distance |
DEG | Algebraic degree |
AI | Algebraic immunity |
MAXAC | Absolute indicator |
![]() |
Sum-of-squares indicator |
LP | Linear potential |
DP | Differential Potential |
Hyperlinks to representations
Open the hyperlinks to representations below in a new browser window or in a new tab.
9.1. Anubis¶
9.1.1. Description¶
Anubis is a block cipher designed by Vincent Rijmen and Paulo S. L. M. Barreto as an entrant in the NESSIE project, a former research program initiated by the European Commission in 2000 for the identification of new cryptographic algorithms. Although the cipher has not been included in the final NESSIE portfolio, its design is considered very strong, and no attacks have been found by 2004 after the project had been concluded. It has a 8x8 S-box called S.
9.1.2. Summary¶
S-box | size | NL | NL2 | LD | DEG | AI | MAXAC | ![]() |
LP | DP |
---|---|---|---|---|---|---|---|---|---|---|
S | 8x8 | 94 | 40 | 7 | 4 | 96 | 272896 | 0.07055664063 | 0.03125 |
9.1.3. S¶
9.1.3.1. Representations¶
Polynomial function over with irreducible polynomial
: Trace representation
Polynomial representation in ANF
Walsh Spectrum representation (except first row and column):

9.1.3.2. Other useful information in cryptanalysis¶
Cycle structure:
Cycle length | Number of cycles |
---|---|
2 | 128 |
There are no linear structures
It has no fixed points
It has 2 negated fixed points: (0,1,1,0,1,1,0,0), (1,0,0,1,0,0,1,1)
9.2. Camellia¶
9.2.1. Description¶
Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits. It was jointly developed by Mitsubishi and NTT of Japan. The cipher has been approved for use by the ISO/IEC, the European Union’s NESSIE project and the Japanese CRYPTREC project. It has four 8x8 S-boxes called S1, S2, S3, S4.
9.2.2. Summary¶
S-box | size | NL | LD | DEG | AI | MAXAC | ![]() |
LP | DP |
---|---|---|---|---|---|---|---|---|---|
S1 | 8x8 | 112 | 56 | 7 | 4 | 32 | 133120 | 0.015625 | 0.015625 |
S2 | 8x8 | 112 | 56 | 7 | 4 | 32 | 133120 | 0.015625 | 0.015625 |
S3 | 8x8 | 112 | 56 | 7 | 4 | 32 | 133120 | 0.015625 | 0.015625 |
S4 | 8x8 | 112 | 56 | 7 | 4 | 32 | 133120 | 0.015625 | 0.015625 |
9.2.3. S1¶
9.2.3.1. Representations¶
Polynomial function over with irreducible polynomial
: Trace representation
Polynomial representation in ANF
Walsh Spectrum representation (except first row and column):

9.2.3.2. Other useful information in cryptanalysis¶
Cycle structure:
Cycle length | Number of cycles |
---|---|
2 | 1 |
5 | 1 |
249 | 1 |
There are no linear structures
It has no fixed points. It has no negated fixed points
9.2.4. S2¶
9.2.4.1. Representations¶
Polynomial function over with irreducible polynomial
: Trace representation
Polynomial representation in ANF

9.2.4.2. Other useful information in cryptanalysis¶
Cycle structure:
Cycle length | Number of cycles |
---|---|
10 | 1 |
13 | 1 |
51 | 1 |
71 | 1 |
111 | 1 |
There are no linear structures
It has no fixed points.
It has 3 negated fixed points: (0,1,0,1,1,1,0,0), (1,0,1,1,0,0,1,1), (1,1,1,1,1,1,1,0)
9.2.5. S3¶
9.2.5.1. Representations¶
Polynomial function over with irreducible polynomial
: Trace representation
Polynomial representation in ANF

9.2.5.2. Other useful information in cryptanalysis¶
Cycle structure:
Cycle length | Number of cycles |
---|---|
5 | 1 |
68 | 1 |
183 | 1 |
There are no linear structures
It has no fixed points.
It has 1 negated fixed point: (1,1,1,0,1,0,1,0)
9.2.6. S4¶
9.2.6.1. Representations¶
Polynomial function over with irreducible polynomial
: Trace representation
Polynomial representation in ANF

9.2.6.2. Other useful information in cryptanalysis¶
Cycle structure:
Cycle length | Number of cycles |
---|---|
10 | 1 |
13 | 1 |
51 | 1 |
71 | 1 |
111 | 1 |
There are no linear structures
It has no fixed points.
It has 3 negated fixed points: (0,0,1,0,1,1,1,0), (0,1,1,1,1,1,1,1), (1,1,0,1,1,0,0,1)
9.3. Grand Cru¶
9.3.1. Description¶
Grand Cru is a block cipher invented in 2000 by Johan Borst. It was submitted to the NESSIE project, but was not selected. It has a Non-linear Substitution Transformation which uses a 8x8 S-box called S.
9.3.2. Summary¶
S-box | size | NL | LD | DEG | AI | MAXAC | ![]() |
LP | DP |
---|---|---|---|---|---|---|---|---|---|
S | 8x8 | 112 | 56 | 7 | 4 | 32 | 133120 | 0.015625 | 0.015625 |
9.3.3. S¶
9.3.3.1. Representations¶
Polynomial function over with irreducible polynomial
: Trace representation
Polynomial representation in ANF

9.3.3.2. Other useful information in cryptanalysis¶
Cycle structure:
Cycle length | Number of cycles |
---|---|
2 | 1 |
27 | 1 |
59 | 1 |
81 | 1 |
87 | 1 |
There are no linear structures
It has no fixed points. It has no negated fixed points