LOKI97
|
LOKI97 | |||
| |||
General | |||
Designer(s) | Lawrie Brown, assisted by Jennifer Seberry and Josef Pieprzyk | ||
First published | 1998 | ||
Derived from | LOKI91 | ||
Cipher(s) based on this design | - | ||
Algorithm detail | |||
Block size(s) | 128 bits | ||
Key size(s) | 128, 192 or 256 bits | ||
Structure | Feistel network | ||
Number of rounds | 16 | ||
Best cryptanalysis | |||
Linear cryptanalysis can be used against LOKI97 requiring 256 known plaintexts (Knudsen and Rijmen, 1999). |
In cryptography, LOKI97 is a block cipher which was a candidate in the Advanced Encryption Standard competition. It is a member of the LOKI family of ciphers, earlier instances being LOKI89 and LOKI91. LOKI97 was designed by Lawrie Brown, assisted by Jennifer Seberry and Josef Pieprzyk.
Like DES, LOKI97 is a 16-round Feistel cipher, and like other AES candidates, has a 128-bit block size and a choice of a 128-, 192- or 256-bit key length. It uses 16 rounds of a balanced feistel network to process the input data blocks (see diagram right). The complex round function f incorporates two substitution-permutation layers in each round.The key schedule is also a Feistel structure — an unbalanced one unlike the main network — but using the same F-function.
Loki97-a.gif
The LOKI97 round function (shown right) uses two columns each with multiple copies of two basic S-boxes. These S-boxes are designed to be higherly non-linear and have a good XOR profile. The permutations before and between server to provide auto-keying and to diffuse the S-box outputs as quickly as possible.
The authors have stated that, "LOKI97 is a non-proprietary algorithm, available for royalty-free use worldwide as a possible replacement for the DES or other existing block ciphers." It was intended to be an evolution of the earlier LOKI89 and LOKI91 block ciphers.
As the first published candidate in the Advanced Encryption Standard competition, it also became the first to be analysed and attacked. An analysis of some problems with the LOKI97 design, which led to its rejection when shortlisting candidates, is given in the paper (Rijmen & Knudsen 1999). It was found to be susceptible to a theoretical differential cryptanalysis attack considerably faster than an exhaustive search.
See also
References
- L. Brown, J. Pieprzyk: Introducing the new LOKI97 Block Cipher
- L.R. Knudsen and V. Rijmen, "Weaknesses in LOKI97", Proceedings of the 2nd AES Candidate Conference, Rome, March 22-23, 1999, pp. 168–174.
- Wenling Wu, Bao Li, Denguo Feng, Sihan Qing, "Cryptanalysis of some AES candidate algorithms", Information and Communication Security - ICICS'99, LNCS 1726, pp 13-21, V Varadharajan (ed), Springer-Verlag 1999.
- Wenling Wu, Bao Li, Denguo Feng, Sihan Qing, "Linear cryptanalysis of LOKI97", Journal of Software, vol 11 no 2, pp 202-6, Feb 2000.
External links
- The LOKI97 homepage (http://www.unsw.adfa.edu.au/~lpb/research/loki97/)
- The design of LOKI97 (http://www.unsw.adfa.edu.au/~lpb/papers/ssp97/loki97b.html)
- SCAN's entry for LOKI97 (http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html#LOKI97)
- John Savard's Description of LOKI97 (http://home.ecn.ab.ca/~jsavard/crypto/co040409.htm)
Block ciphers edit (https://academickids.com:443/encyclopedia/index.php?title=Template:Block_ciphers&action=edit) |
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA |
Design: Feistel network | Key schedule | Product cipher | S-box | SPN Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL Standardisation: AES process | CRYPTREC | NESSIE Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key |