On the SAFER cryptosystem
- First Online:
An abstraction and some desirable properties of the PHT layer as defined in SAFER are identified. These properties lead to the construction of 3071 other structures which could be used as alternative PHT layers. Results of preliminary investigations carried out on these structures to ascertain their suitability as alternatives are briefly discussed, together with other possible uses and open problems.
Unable to display preview. Download preview PDF.
- 1.Lars R. Knudsen: A key-schedule weakness in SAFER K-64. D. Coppersmith editor, Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science, 963 (1995) 274–286.Google Scholar
- 2.Lars R. Knudsen, Thomas A. Berson: Truncated Differentials of SAFER. D. Gollman editor, Fast Software Encryption, Lecture Notes in Computer Science, 1039 (1996) 15–26.Google Scholar
- 3.J.L. Massey: SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. Fast Software Encryption, Lecture Notes in Computer Science, 809 (1994) 1–17.Google Scholar
- 4.J.L. Massey: SAFER K-64: One Year Later. B. Preneel editor, Fast Software Encryption, Lecture Notes in Computer Science, 1008 (1995) 212–241.Google Scholar
- 5.J.L. Massey: Announcement of 40-bit key scedule for SAFER. E-mail announcement by author, 22 October 1995.Google Scholar
- 6.Sean Murphy: An Analysis of SAFER. Journal of Cryptology (to appear).Google Scholar
- 7.C.E. Shannon: Communication theory of secrecy systems. Bell Systems Tech. Jul., 28 (1949) 656–715.Google Scholar
- 8.Serge Vaudenay: On the need for Multipermutations: Cryptanalysis of MD4 and SAFER. Fast Software Encryption, Lecture Notes in Computer Science, 1008 (1995) 286–297.Google Scholar