LOKI (cipher): Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Meg Taylor
(subpages)
imported>Sandy Harris
No edit summary
Line 1: Line 1:
{{subpages}}
{{subpages}}
'''LOKI''' is the name a series of [[block cipher]]s from an Australian group.
'''LOKI''' is the name of a series of [[block cipher]]s from an Australian group.


The original LOKI, later renamed '''LOKI89''', was a [[Feistel cipher]] with 64-bit blocks taking a 64-bit key. It had some weaknesses. LOKI was designed before [[differential cryptanalysis]] first appeared in the open literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knudsen]] found a weakness in the key schedule.
The original LOKI, later renamed '''LOKI89''', was a [[Feistel cipher]] with 64-bit blocks taking a 64-bit key. It had some weaknesses. LOKI was designed before [[differential cryptanalysis]] first appeared in the open literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, [[Lars Knudsen]] found a weakness in the key schedule.

Revision as of 22:49, 28 February 2010

This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

LOKI is the name of a series of block ciphers from an Australian group.

The original LOKI, later renamed LOKI89, was a Feistel cipher with 64-bit blocks taking a 64-bit key. It had some weaknesses. LOKI was designed before differential cryptanalysis first appeared in the open literature, and published at about the same time as the first differential cryptanalysis paper. It turned out to have some weaknesses against that. Also, Lars Knudsen found a weakness in the key schedule.

LOKI91 was a revised version, with those weaknesses fixed.

LOKI97 was designed as a candidate for the AES competition; it did not make it into the finals. Like all AES candidates, it uses 128-bit blocks and supports key sizes of 128, 192 or 256 bits. It is a 16-round Feistel cipher with an F function that is basically two rounds of an SP network. This contrasts with DES where the F function is a single SP round.

The cipher is freely available for any use. It has a home page; see external links.