Cryptanalysis of LOKI
نویسندگان
چکیده
منابع مشابه
Cryptanalysis of LOKI
In BPS90] Brown, Pieprzyk and Seberry proposed a new encryp-tion primitive, which encrypts and decrypts a 64-bit block of data using a 64-bit key. Furthermore they propose a way to build private versions of LOKI. In this paper we show rst that the keyspace of any LOKI-version is only 2 60 , not 2 64 as claimed. Therefore there are 15 equivalent keys for every key, that encrypts/decrypts texts t...
متن کاملImproving Resistance to Differential Cryptanalysis and the Redesign of LOKI
Differential Cryptanalysis is currently the most powerful tool available for analysing block ciphers, and new block ciphers need to be designed to resist it. It has been suggested that the use of S-boxes based on bent functions, with a fiat XOR profile, would be immune. However our studies of differential cryptanalysis, particularly applied to the LOKI cipher, have shown that this is not the ca...
متن کاملDifferential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
In 1,2] we introduced the notion of diierential cryptanalysis based on chosen plaintext attacks. In 3,4] we described the application of diierential crypt-analysis to Feall12,11] and extended the method to known plaintext attacks. In this paper diierential cryptanalysis methods are applied to the hash function Snefruu9] and to the cryptosystems Khafree10], REDOC-III14,6], LOKII5] and Luciferr7].
متن کاملLoki Presentation of Logic-based Semantic Wiki
TOOL PRESENTATION: The paper presents a semantic wiki, called Loki, with strong logical knowledge representation using rules. The system uses a coherent logic-based representation for semantic annotations of the content and implementing reasoning procedures. The representation uses the logic programming paradigm and the Prolog programming language. The proposed architecture allows for rule-base...
متن کاملCryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: DAIMI Report Series
سال: 1992
ISSN: 2245-9316,0105-8517
DOI: 10.7146/dpb.v21i403.6637