SAFER (Secure And Fast Encryption Routine
#1

SAFER


In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf of Cylink Corporation. The early SAFER K and SAFER SK function, but differ in the number of rounds and the designs share the same encryptionkey schedule. More recent versions ” SAFER+ and SAFER++ ” were submitted as candidates to the AES process and the NESSIE project respectively. All of the algorithms in the SAFER family are unpatented and available for unrestricted use.

The first SAFER cipher was SAFER K-64, published by Massey in 1993, with a 64-bit block size. The 'K-64' denotes a key size of 64 bits. There was some demand for a version with a larger 128-bit key, and the following year Massey published such a variant incorporating new key schedule designed by the Singapore Ministry for Home affairs: SAFER K-128. However, both Lars Knudsen and Sean Murphy found minor weaknesses in this version, prompting a redesign of the key schedule to one suggested by Knudsen; these variants were named SAFER SK-64 and SAFER SK-128 respectively ” the 'SK' standing for 'Strengthened Key schedule', though the RSA FAQ reports that, 'one joke has it that SK really stands for 'Stop Knudsen', a wise precaution in the design of any block cipher'. Another variant with a reduced key size was published, SAFER SK-40, to comply with 40-bit export restrictions.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: fast vturesource, basic strength training routine for, safer construction practices for dosaster managment, safer construction practices in disaster management in hindi, how to lvl engineering fast, cryptography safer algorithm ppt, safer construction hindi wikipidia,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 1 3,105 29-10-2012, 05:31 PM
Last Post: seminar details
  ROBOTIC SURGERY AND TELE-SURGERY: BASIC PRINCIPLES AND DESCRIPTION OF A NOVEL CONCEPT projectsofme 1 2,875 27-02-2012, 01:12 PM
Last Post: seminar paper
  SUPER FAST USB 3.0 seminar class 4 3,857 31-01-2012, 10:03 AM
Last Post: seminar addict
  SECURE COGNITIVE MOBILE HOTSPOT seminar class 2 3,060 08-08-2011, 09:54 AM
Last Post: seminar addict
  IP Authoring and Integration for HW/SW Co-Design and Reuse seminar class 0 1,412 05-05-2011, 11:07 AM
Last Post: seminar class
  Smart Cards: Technology for Secure Management of Information seminar class 0 2,048 23-04-2011, 04:10 PM
Last Post: seminar class
  Chaffing & winnowing Confidentiality w/o Encryption seminar class 1 1,405 19-04-2011, 03:28 PM
Last Post: seminar class
  Using the iPhone and iPod Touch for Remote Sensor Control and Data Acquisition project report helper 0 2,041 19-10-2010, 01:05 PM
Last Post: project report helper
  Pheromone based adaptive routing and replication for fast lookups in a distributed seminar presentation 0 989 19-05-2010, 09:41 PM
Last Post: seminar presentation
  fast userspace mutex FUTEX Seminar Report Information Technology 0 4,170 31-12-2009, 06:04 PM
Last Post: Information Technology

Forum Jump: