Skip to main content

On the SAFER cryptosystem

  • Conference paper
  • First Online:
Book cover Crytography and Coding (Cryptography and Coding 1997)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1355))

Included in the following conference series:

Abstract

An abstraction and some desirable properties of the PHT layer as defined in SAFER are identified. These properties lead to the construction of 3071 other structures which could be used as alternative PHT layers. Results of preliminary investigations carried out on these structures to ascertain their suitability as alternatives are briefly discussed, together with other possible uses and open problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lars R. Knudsen: A key-schedule weakness in SAFER K-64. D. Coppersmith editor, Advances in Cryptology-CRYPTO'95, Lecture Notes in Computer Science, 963 (1995) 274–286.

    Google Scholar 

  2. Lars R. Knudsen, Thomas A. Berson: Truncated Differentials of SAFER. D. Gollman editor, Fast Software Encryption, Lecture Notes in Computer Science, 1039 (1996) 15–26.

    Google Scholar 

  3. J.L. Massey: SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. Fast Software Encryption, Lecture Notes in Computer Science, 809 (1994) 1–17.

    Google Scholar 

  4. J.L. Massey: SAFER K-64: One Year Later. B. Preneel editor, Fast Software Encryption, Lecture Notes in Computer Science, 1008 (1995) 212–241.

    Google Scholar 

  5. J.L. Massey: Announcement of 40-bit key scedule for SAFER. E-mail announcement by author, 22 October 1995.

    Google Scholar 

  6. Sean Murphy: An Analysis of SAFER. Journal of Cryptology (to appear).

    Google Scholar 

  7. C.E. Shannon: Communication theory of secrecy systems. Bell Systems Tech. Jul., 28 (1949) 656–715.

    Google Scholar 

  8. Serge Vaudenay: On the need for Multipermutations: Cryptanalysis of MD4 and SAFER. Fast Software Encryption, Lecture Notes in Computer Science, 1008 (1995) 286–297.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Michael Darnell

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Brincat, K., Meijer, A. (1997). On the SAFER cryptosystem. In: Darnell, M. (eds) Crytography and Coding. Cryptography and Coding 1997. Lecture Notes in Computer Science, vol 1355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0024449

Download citation

  • DOI: https://doi.org/10.1007/BFb0024449

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63927-5

  • Online ISBN: 978-3-540-69668-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics