skip to main content
10.5555/646756.705381guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer

Published: 11 August 1991 Publication History

Abstract

In [1,2] we introduced the notion of differential cryptanalysis based an chosen plaintext attacks. In [3,4] we described the application of differential cryptanalysis to Feal[13,12] and extended the method to known plaintext attacks. In this paper we apply differential cryptanalytic methods to the hash function Snefru[10] and to the cryptosystems Khafre[11], REDOC-II[6,7], LOKI[5] and Lucifer[8].

References

[1]
Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems (extended abstract) , Advances in cryptology, proceedings of CRYPTO 90, 1990.
[2]
Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems , Journal of Cryptology, Vol. 4, No. 1, 1991, to appear.
[3]
Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash (extended abstract) , Advances in cryptology, proceedings of EUROCRYPT 91, 1991.
[4]
Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash , in preperation.
[5]
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI - A Cryptographic Primitive for Authentication and Secrecy Applications , Advances in cryptology, proceedings of AUSCRYPT 90, pp. 229-236, 1990.
[6]
Michael C. Wood, technical report, Cryptech inc., Jamestown, NY, July 1990.
[7]
Thomas W. Cusick, Michael C. Wood, The REDOC-II Cryptosystem , Advances in cryptology, proceedings of CRYPTO 90, 1990.
[8]
H. Feistel, Cryptography and Data Security , Scientific American, Vol. 228, No. 5, pp. 15-23, May 1973.
[9]
Matthew Kwan, private communications.
[10]
Ralph C. Morkle, A Fast Software One-Way Hash Function , Journal of Cryptology, Vol. 3, No. 1, pp. 43-58, 1990.
[11]
Ralph C. Merkle, Fast Software Encryption Functions , Advances in cryptology, proceedings of CRYPTO 90, 1990.
[12]
Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm Feal-8 , Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433- 437, 1988.
[13]
Akihiro Shimizu, Shoji Miyaguchi. Fast Data Encryption Algorithm Feal , Advances in cryptology, proceedings of EUROCRYPT 87, pp. 267-278, 1987.
[14]
Arthur Sorkin, Lucifer, a Cryptographic Algorithm , Cryptologia, Vol. 8, No. 1, pp. 22-41, January 1984.

Cited By

View all
  1. Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Guide Proceedings
        CRYPTO '91: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
        August 1991
        484 pages
        ISBN:3540551883

        Publisher

        Springer-Verlag

        Berlin, Heidelberg

        Publication History

        Published: 11 August 1991

        Qualifiers

        • Article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 31 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        View options

        Figures

        Tables

        Media

        Share

        Share

        Share this Publication link

        Share on social media