Performance Evaluation of Safer K-64 and S-Boxes of the Safer Family

نویسندگان

  • Ekrem ARAS
  • Melek D. YÜCEL
چکیده

If the characteristics of s-boxes of the SAFER family of ciphers are examined for the criteria of strict avalanche, bit independence, and XOR table distribution, experiments show that the “exponentiating” s-box has a weakness for an input difference of 128 (=100000002) and the “logarithm-taking” s-box has a weakness for an input difference of 253 (=111111012). However, since these experiments are performed by isolating the s-boxes from the general structure, they do not necessarily indicate a weakness in the overall algorithm. We propose a quick and rough test method, called the avalanche weight distribution criterion, to evaluate the overall performance of block ciphers. We then apply this novel criterion and the conventional strict avalanche criterion to SAFER K-64, and show that the algorithm passes both tests successfully despite the specific weaknesses of its isolated s-boxes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Truncated Differential Attacks on SAFER

Knudsen and Berson have applied truncated differential attack on 5 round SAFER K-64 successfully. However, their attack is not efficient when applied on 5 round SAFER SK-64 (with the modified key schedule) and can not be applied on 6 round SAFER. In this paper, we improve the truncated differential attack on SAFER by using better truncated differential and additional filtering method. Our attac...

متن کامل

Predictors of Safer Conception Practices Among HIV-Infected Women in Northern Nigeria

Background Persons living with HIV often face discrimination in safe sex and reproductive choices, especially in lowresource settings. This study assessed fertility desires and intentions, risk perception and correlates of ever use of at least one safer conception method among HIV-infected women attending a tertiary health facility ...

متن کامل

A mathematical model for hazmat and freight transportation in railway networks

In this paper, we develop a freight transportation model for railway network considering hazmat transportation issue. In the transportation system considered, different customers can request for carrying hazmat and non- hazmat boxes. It is assumed that the sequence of the trains in the network is known. The objective is assigning the non-hazmat boxes and hazmat boxes to wagons of the trains so ...

متن کامل

Effect of digital elevation model’s resolution in producing flood hazard maps

Flooding is one of the most devastating natural disasters occurring annually in the Philippines. A call for a solution for this malady is very challenging as well as crucial to be addressed. Mapping flood hazard is an effective tool in determining the extent and depth of floods associated with hazard level in specified areas that need to be prioritized during flood occurrences. Precedent to the...

متن کامل

New Impossible Differential Attack on SAFER + and SAFER + +

SAFER+ was a candidate block cipher for AES with 128-bit block size and a variable key sizes of 128, 192 or 256 bits. Bluetooth uses customized versions of SAFER+ for security. The numbers of rounds for SAFER+ with key sizes of 128, 192 and 256 are 8, 12 and 16, respectively. SAFER++, a variant of SAFER+, was among the cryptographic primitives selected for the second phase of the NESSIE project...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001