Advertisement

SAFER K-64: One year later

  • James L. Massey
Session 4: Block Ciphers-Differential Cryptanalysis
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1008)

Keywords

Boolean Function Block Cipher Nonlinear Order Data Encryption Standard Linear Cryptanalysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. [BIH90]
    E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryptosystems,” pp. 2–21 in Advances in Cryptology-CRYPTO '90 (Eds. A. J. Menezes and S. A. Vanstone), Lecture Notes in Computer Science No. 537. Heidelberg and New York: Springer, 1991.Google Scholar
  2. [BIH93]
    E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard. New York: Springer, 1993.Google Scholar
  3. [HAR95a]
    C. Harpes, “A Generalization of Linear Cryptanalysis Applied to SAFER,” Technical Report, Signal and Info. Proc. Lab., Swiss Federal Inst. Tech., Zurich, March 9, 1995. (http://www.isi.ee.ethz.ch/isiworld/isi/research/)Google Scholar
  4. [HAR95b]
    C. Harpes, G. G. Kramer and J. L. Massey, “A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma,” to be presented at EUROCRYPT '95.Google Scholar
  5. [HUB90]
    K. Huber, “Neue Kryptographische Verfahren durch Kombination von Operationen in endlichen Körpern mit der schnellen Walshtransformation,” unpublished manuscript, presented and distributed to participants at the Telesec Arbeitskreis Kryptosysteme, Darmstadt, Germany, Oct. 2, 1990.Google Scholar
  6. [KNU95]
    L. R. Knudsen, “A Weakness in SAFER K-64,” manuscript submitted to CRYPTO '95, Feb. 16, 1995.Google Scholar
  7. [LAI91]
    X. Lai, J. L. Massey and S. Murphy, “Markov Ciphers and Differential Cryptanalysis,” pp. 17–38 in Advances in Cryptology-EUROCRYPT '91 (Ed. D. W. Davies), Lecture Notes in Computer Science No. 547. Heidelberg and New York: Springer, 1991.Google Scholar
  8. [LAI93]
    X. Lai and J.L. Massey, “Hash Functions Based on Block Ciphers,” pp. 55–70 in Advances in Cryptology-EUROCRYPT '92 (Ed. R. A. Rueppel), Lecture Notes in Computer Science No. 658. Heidelberg and New York: Springer, 1993.Google Scholar
  9. [MAS94]
    Massey, J. L., “SAFER K-64: A Byte-Oriented Block Ciphering Algorithm,” pp. 1–17 in Fast Software Encryption (Ed. R. Anderson), Proceedings of the Cambridge Security Workshop, Cambridge, U. K., Dec. 9–11, 1993, Lecture Notes in Computer Science No. 809. Heidelberg and New York: Springer, 1994.Google Scholar
  10. [MAT93]
    M. Matsui, “Linear Cryptanalysis Method for DES Cipher,” pp. 386–397 in Advances in Cryptology-EUROCRYPT '93 (Ed. T. Helleseth), Lecture Notes in Computer Science No. 765. New York: Springer, 1994.Google Scholar
  11. [MAT94]
    M. Matsui, “The First Experimental Cryptanalysis of the Data Encryption Standard,” pp. 1–11 in Advances in Cryptology-CRYPTO '94 (Ed. Y. G. Desmedt), Lecture Notes in Computer Science No. 839. Heidelberg and New York: Springer, 1994.Google Scholar
  12. [PER94]
    S. R. Perkins, “Linear Cryptanalysis of the SAFER K-64 Block Cipher,” Diploma Thesis, Signal & Info. Proc. Lab., Swiss Fed. Inst. of Tech., Zurich, 15 July 1994.Google Scholar
  13. [SCH92]
    C. P. Schnorr, “FFT-Hash II, Efficient Cryptographic Hashing,” pp. 45–54 in Advances in Cryptology-EUROCRYPT '92 (Ed. R. A. Rueppel), Lecture Notes in Computer Science No. 658. Heidelberg and New York: Springer, 1993.Google Scholar
  14. [VAU95]
    S. Vaudenay, “On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER,” pp. 286–297 in this volume.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • James L. Massey
    • 1
  1. 1.Signal & Information Processing LaboratorySwiss Federal Institute of Technology ETH ZentrumZurichSwitzerland

Personalised recommendations