Abstract
This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64,1(In this paper, the number in the name of the ciphers indicates the key length).1 using 245 chosen plaintexts, 238 bytes memory and 242 half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128 uses 278 chosen plaintexts, 275 half round computations and 268 bytes memory. And attack on 3.75-round SAFER++/128 uses 278 data, 266 time, and 262 memory.
| Original language | English |
|---|---|
| Pages (from-to) | 180-189 |
| Number of pages | 10 |
| Journal | Computers and Electrical Engineering |
| Volume | 36 |
| Issue number | 1 |
| DOIs | |
| Publication status | Published - Jan 2010 |
| Externally published | Yes |
Keywords
- Impossible differential
- SAFER+
- SAFER++
- SAFER-SK