Abstract
In [1,2] we introduced the notion of differential cryptanalysis based on chosen plaintext attacks. In [3,4] we described the application of differential cryptanalysis to Feal[13,12] and extended the method to known plaintext attacks. In this paper we apply differential cryptanalytic methods to the hash function Snefru[10] and to the cryptosystems Khafre[11], REDOC-II[6,7], LOKI[5] and Lucifer[8].
Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
References
Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems (extended abstract), Advances in cryptology, proceedings of CRYPTO 90, 1990.
Eli Biham, Adi Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology, Vol. 4, No. 1, 1991, to appear.
Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash (extended abstract), Advances in cryptology, proceedings of EUROCRYPT 91, 1991.
Eli Biham, Adi Shamir, Differential Cryptanalysis of Feal and N-Hash, in preperation.
Lawrence Brown, Josef Pieprzyk, Jennifer Seberry, LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications, Advances in cryptology, proceedings of AUSCRYPT 90, pp. 229–236, 1990.
Michael C. Wood, technical report, Cryptech inc., Jamestown, NY, July 1990.
Thomas W. Cusick, Michael C. Wood, The REDOC-II Cryptosystem, Advances in cryptology, proceedings of CRYPTO 90, 1990.
H. Feistel, Cryptography and Data Security, Scientific American, Vol. 228, No. 5, pp. 15–23, May 1973.
Matthew Kwan, private communications.
Ralph C. Merkle, A Fast Software One-Way Hash Function, Journal of Cryptology, Vol. 3, No. 1, pp. 43–58, 1990.
Ralph C. Merkle, Fast Software Encryption Functions, Advances in cryptology, proceedings of CRYPTO 90, 1990.
Shoji Miyaguchi, Akira Shiraishi, Akihiro Shimizu, Fast Data Encryption Algorithm Feal-8, Review of electrical communications laboratories, Vol. 36, No. 4, pp. 433–437, 1988.
Akihiro Shimizu, Shoji Miyaguchi. Fast Data Encryption Algorithm Feal, Advances in cryptology, proceedings of EUROCRYPT 87, pp. 267–278, 1987.
Arthur Sorkin, Lucifer, a Cryptographic Algorithm, Cryptologia, Vol. 8, No. 1, pp. 22–41, January 1984.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1992 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biham, E., Shamir, A. (1992). Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. In: Feigenbaum, J. (eds) Advances in Cryptology — CRYPTO ’91. CRYPTO 1991. Lecture Notes in Computer Science, vol 576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46766-1_11
Download citation
DOI: https://doi.org/10.1007/3-540-46766-1_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-55188-1
Online ISBN: 978-3-540-46766-3
eBook Packages: Springer Book Archive