scispace - formally typeset
Open Access

Introducing the new LOKI97 Block Cipher

Reads0
Chats0
TLDR
This paper describes LOKI97, a new private key block cipher with 128-bit data and a 256-bit key schedule, which can be initialised by 128, 192, or 256- bit keys.
Abstract
This paper describes LOKI97, a new private key block cipher with 128-bit data and a 256-bit key schedule, which can be initialised by 128, 192, or 256-bit keys. The data computation uses 16 rounds of a balanced Feistel network with a complex function f which incorporates two S-P layers. The 256-bit key schedule uses 48 rounds of an unbalanced Feistel network using the same complex function f to generate the subkeys. The cipher specication is given, followed by some background and design considerations, and a preliminary analysis.

read more

Citations
More filters
Journal ArticleDOI

Book review: Applied cryptography: Protocols, algorithms, and source code in C

TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.
Book

The Block Cipher Companion

TL;DR: This book provides a technically detailed, yet readable, account of the state of the art of block cipher analysis, design, and deployment and provides an overview of some of the most important cryptanalytic methods.

Performance Comparison of the AES Submissions

TL;DR: This paper compares the performance of the leading AES candidates on a variety of common platforms: 32-bit CPUs, 64- bit CPUs, cheap 8-bit smart-card CPUs, and dedicated hardware.
Book ChapterDOI

A High-Performance Flexible Architecture for Cryptography

TL;DR: This paper describes how various proposed AES algorithms could be implemented on PipeRench, a reconfigurable fabric that supports implementations which can yield better than custom-hardware performance and yet maintains all the flexibility of software based systems.

Statistical cryptanalysis of block ciphers

Pascal Junod
TL;DR: This thesis aims to add a (small) stone to the wall of provable security of block ciphers with the (theoretical and experimental) statistical analysis of the mechanisms behind Matsui's linear cryptanalysis as well as more abstract models of attacks.
References
More filters
Book

Applied Cryptography: Protocols, Algorithms, and Source Code in C

TL;DR: This document describes the construction of protocols and their use in the real world, as well as some examples of protocols used in the virtual world.
Book ChapterDOI

Linear cryptanalysis method for DES cipher

TL;DR: A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.
Book ChapterDOI

Differentially uniform mappings for cryptography

Kaisa Nyberg
TL;DR: Differentially uniform mappings as discussed by the authors have also desirable cryptographic properties: large distance from affine functions, high nonlinear order and efficient computability, and have also been used in DES-like ciphers.
Book ChapterDOI

On the Design of S-Boxes

TL;DR: The ideas of completeness and the avalanche effect were first introduced by Kam and Davida and Feistel [2], respectively.
Book ChapterDOI

TEA, a tiny encryption algorithm

TL;DR: This paper gives a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.