Back to Search Start Over

A new impossible differential attack on SAFER ciphers

Authors :
Zheng, Shihui
Wang, Licheng
Yang, Yixian
Source :
Computers & Electrical Engineering. Jan2010, Vol. 36 Issue 1, p180-189. 10p.
Publication Year :
2010

Abstract

Abstract: This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64, [1] (In this paper, the number in the name of the ciphers indicates the key length). 1 using chosen plaintexts, bytes memory and half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128 uses chosen plaintexts, half round computations and bytes memory. And attack on 3.75-round SAFER++/128 uses data, time, and memory. [Copyright &y& Elsevier]

Details

Language :
English
ISSN :
00457906
Volume :
36
Issue :
1
Database :
Academic Search Index
Journal :
Computers & Electrical Engineering
Publication Type :
Academic Journal
Accession number :
47149438
Full Text :
https://doi.org/10.1016/j.compeleceng.2009.08.004