Advertisement

Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer

Extended Abstract
  • Eli Biham
  • Adi Shamir
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 576)

Abstract

In [1,2] we introduced the notion of differential cryptanalysis based on chosen plaintext attacks. In [3,4] we described the application of differential cryptanalysis to Feal[13,12] and extended the method to known plaintext attacks. In this paper we apply differential cryptanalytic methods to the hash function Snefru[10] and to the cryptosystems Khafre[11], REDOC-II[6,7], LOKI[5] and Lucifer[8].

References

  1. [1]
    Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems (extended abstract), Advances in cryptology, proceedings of CRYPTO 90, 1990.Google Scholar
  2. [2]
    Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology, Vol. 4, No. 1, 1991, to appear.Google Scholar
  3. [3]
    Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash (extended abstract), Advances in cryptology, proceedings of EUROCRYPT 91, 1991.Google Scholar
  4. [4]
    Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash, in preperation.Google Scholar
  5. [5]
    Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications, Advances in cryptology, proceedings of AUSCRYPT 90, pp. 229–236, 1990.Google Scholar
  6. [6]
    Michael C. Wood, technical report, Cryptech inc., Jamestown, NY, July 1990.Google Scholar
  7. [7]
    Thomas W. Cusick, Michael C. Wood, The REDOC-II Cryptosystem, Advances in cryptology, proceedings of CRYPTO 90, 1990.Google Scholar
  8. [8]
    H. Feistel, Cryptography and Data Security, Scientific American, Vol. 228, No. 5, pp. 15–23, May 1973.CrossRefGoogle Scholar
  9. [9]
    Matthew Kwan, private communications.Google Scholar
  10. [10]
    Ralph C. Merkle, A Fast Software One-Way Hash Function, Journal of Cryptology, Vol. 3, No. 1, pp. 43–58, 1990.MATHCrossRefMathSciNetGoogle Scholar
  11. [11]
    Ralph C. Merkle, Fast Software Encryption Functions, Advances in cryptology, proceedings of CRYPTO 90, 1990.Google Scholar
  12. [12]
    Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm Feal-8, Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433–437, 1988.Google Scholar
  13. [13]
    Akihiro Shimizu, Shoji Miyaguchi. Fast Data Encryption Algorithm Feal, Advances in cryptology, proceedings of EUROCRYPT 87, pp. 267–278, 1987.Google Scholar
  14. [14]
    Arthur Sorkin, Lucifer, a Cryptographic Algorithm, Cryptologia, Vol. 8, No. 1, pp. 22–41, January 1984.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1992

Authors and Affiliations

  • Eli Biham
    • 1
  • Adi Shamir
    • 1
  1. 1.Department of Applied Mathematics and Computer ScienceThe Weizmann Institute of ScienceRehovotIsrael

Personalised recommendations