A new impossible differential attack on SAFER ciphers

  • Authors:
  • Shihui Zheng;Licheng Wang;Yixian Yang

  • Affiliations:
  • Information Security Center, State Key Laboratory of Networking and Switching Technology, Key Laboratory of Network and Information Attack & Defence Technology of MOE, Beijing University of Posts ...;Information Security Center, State Key Laboratory of Networking and Switching Technology, Key Laboratory of Network and Information Attack & Defence Technology of MOE, Beijing University of Posts ...;Information Security Center, State Key Laboratory of Networking and Switching Technology, Key Laboratory of Network and Information Attack & Defence Technology of MOE, Beijing University of Posts ...

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents an improved impossible differential cryptanalysis of SAFER ciphers, which uses the miss-in-the-middle technique developed by Biham et al. We analyze 3.75-round SAFER SK-64, using 2^4^5 chosen plaintexts, 2^3^8 bytes memory and 2^4^2 half round computations. Furthermore, the new impossible differential attack on 3.75-round SAFER+/128 uses 2^7^8 chosen plaintexts, 2^7^5 half round computations and 2^6^8 bytes memory. And attack on 3.75-round SAFER++/128 uses 2^7^8 data, 2^6^6 time, and 2^6^2 memory.