Filters








7 Hits in 6.3 sec

Improving resistance to differential cryptanalysis and the redesign of LOKI [chapter]

Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry
1993 Lecture Notes in Computer Science  
Seberry, Improving resistance to differential cryptanalysis and the redesign of LOKI, Advances in Cryptology -ASIACRYPT'91, (H. Imai, R. L. Rivest and T.  ...  Differential Cryptanalysis is currently the most powerful tool available for analysing block ciphers, and new block ciphers need to be designed to resist it.  ...  Redesign of LOKI Some Additional Design Guidelines To improve the resistance of a cipher to differential cryptanalysis, and to remove problems with the key schedule, the following guidelines were used  ... 
doi:10.1007/3-540-57332-1_3 fatcat:d3n23dxvk5fcxjrietkr7g53su

Cryptanalysis of LOKI91

Lars Ramkilde Knudsen
2003 DAIMI Report Series  
In this paper we examine the redesign of LOKI, LOKI91 proposed by Brown et al.  ...  Secondly we show that the size of the image of the F-function in LOKI91 is 8\22*2^32.  ...  Acknowledgements We wish to thank Prof. Ivan Damg ard for valuable discussions on the enumeration of the keys in the chosen plaintext attack.  ... 
doi:10.7146/dpb.v22i440.7970 fatcat:2nhdfbbbyrbm5dm5ssuqemmedy

Cryptanalysis of LOKI 91 [chapter]

Lars Ramkilde Knudsen
1993 Lecture Notes in Computer Science  
In this paper we examine the redesign of LOKI, LOKI 91 proposed in 5 .  ...  Secondly we show that the size of the image of the F-function in LOKI 91 is 8 13 2 32 .  ...  Acknowledgements We wish to thank Prof. Ivan Damg ard for valuable discussions on the enumeration of the keys in the chosen plaintext attack.  ... 
doi:10.1007/3-540-57220-1_62 fatcat:dnmqcofz3falrpmyividp5jixa

Cryptanalysis of LOKI [chapter]

Lars Ramkilde Knudsen
1993 Lecture Notes in Computer Science  
In this paper we examine the redesign of LOKI, LOKI 91 proposed in 5].  ...  Secondly we s h o w that the size of the image of the F-function in LOKI 91 is 8 13 2 32 .  ...  Acknowledgements We wish to thank Prof. Ivan Damg ard for valuable discussions on the enumeration of the keys in the chosen plaintext attack.  ... 
doi:10.1007/3-540-57332-1_2 fatcat:qntcmyborza4jntlnl67wtt5i4

Block Ciphers: Analysis, Design and Applications

Lars Ramkilde Knudsen
1994 DAIMI Report Series  
In this thesis we study cryptanalysis, applications and design of secret key block ciphers.  ...  In particular, the important class of Feistel ciphers is studied, which has a number of rounds, where in each round one applies a cryptographically weak function.  ...  For always patiently listening to and commenting on my ideas and research topics and for not laughing whenever I "broke" the DES algorithm. Also, thank you  ... 
doi:10.7146/dpb.v23i485.6978 fatcat:x7n4htukmrdspogiykdw6cr3mm

The design of the ICE encryption algorithm [chapter]

Matthew Kwan
1997 Lecture Notes in Computer Science  
It also introduces the concept of keyed permutation to improve resistance to differential and linear cryptanalysis, and the use of an extensible key schedule to achieve an explict tradeoff between speed  ...  This paper describes the design and implementation of the ICE cryptosystem, a 64-bit Feistel block cipher. It describes the design process, with the various aims and tradeoffs involved.  ...  A great challenge to cryptosystem designers has been resistance to differential cryptanalysis.  ... 
doi:10.1007/bfb0052335 fatcat:6t4tv4vuarf3zgjpbcbqbupdju

Status report on the first round of the development of the advanced encryption standard

James Nechvatal, Elaine Barker, Donna Dodson, Morris Dworkin, James Foti, Edward Roback
1999 Journal of Research of the National Institute of Standards and Technology  
Status Report on the First Round of the Development of the Advanced Encryption Standard  ...  On the other hand, some notable attacks (e.g., differential and linear cryptanalysis) are directly round-oriented.  ...  Security is the most important factor in the evaluation, and it encompasses features such as: resistance of the algorithm to cryptanalysis, soundness of its mathematical basis, randomness of the algorithm  ... 
doi:10.6028/jres.104.027 fatcat:2hvna46m2jaxbkuusctma5dgjq