LOKI (cipher): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: '''LOKI''' is the name a series of block ciphers from an Australian group. The original LOKI, later renamed '''LOKI89''', had some weaknesses. LOKI was designed before [[differential ...)
 
imported>Sandy Harris
No edit summary
Line 1: Line 1:
'''LOKI''' is the name a series of [[block cipher]]s from an Australian group.
'''LOKI''' is the name a series of [[block cipher]]s from an Australian group.


The original LOKI, later renamed '''LOKI89''', had some weaknesses. LOKI was designed before [[differential cryptanalysis]] first appeared in the open literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knudsen]] found a weakness in the key schedule.
The original LOKI, later renamed '''LOKI89''', was a [[Feistel cipher]] with 64-bit blocks taking a 64-bit key. It had some weaknesses. LOKI was designed before [[differential cryptanalysis]] first appeared in the open literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knudsen]] found a weakness in the key schedule.


'''LOKI91''' was a revised version, with those weaknesses fixed.
'''LOKI91''' was a revised version, with those weaknesses fixed.

Revision as of 07:24, 9 August 2009

LOKI is the name a series of block ciphers from an Australian group.

The original LOKI, later renamed LOKI89, was a Feistel cipher with 64-bit blocks taking a 64-bit key. It had some weaknesses. LOKI was designed before differential cryptanalysis first appeared in the open literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, Lars Knudsen found a weakness in the key schedule.

LOKI91 was a revised version, with those weaknesses fixed.

LOKI97 was designed as a candidate for the AES competition; it did not make it into the finals. Like all AES candidates, it uses 128-bit blocks and supports key sizes of 128, 192 or 256 bits. It is a 16-round Feistel cipher with an F function that is basically two rounds of an SP network. This contrasts with DES where the F function is a single SP round.

The cipher is freely available for any use. It has a home page; see external links.