A new impossible differential attack on SAFER ciphers

  • Shihui Zheng
  • , Licheng Wang*
  • , Yixian Yang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64,1(In this paper, the number in the name of the ciphers indicates the key length).1 using 245 chosen plaintexts, 238 bytes memory and 242 half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128 uses 278 chosen plaintexts, 275 half round computations and 268 bytes memory. And attack on 3.75-round SAFER++/128 uses 278 data, 266 time, and 262 memory.

Original languageEnglish
Pages (from-to)180-189
Number of pages10
JournalComputers and Electrical Engineering
Volume36
Issue number1
DOIs
Publication statusPublished - Jan 2010
Externally publishedYes

Keywords

  • Impossible differential
  • SAFER+
  • SAFER++
  • SAFER-SK

Fingerprint

Dive into the research topics of 'A new impossible differential attack on SAFER ciphers'. Together they form a unique fingerprint.

Cite this