An Analysis of SAFER
We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z -module. In particular, we consider the invariant Z -submodules of the PHT layer and show how these invariant Z -submodules give potential cryptographic weaknesses.
Saved in:
| Published in: | Journal of cryptology Vol. 11; no. 4; pp. 235 - 251 |
|---|---|
| Main Author: | |
| Format: | Journal Article |
| Language: | English |
| Published: |
New York, NY
Springer
01.09.1998
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0933-2790, 1432-1378 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z -module. In particular, we consider the invariant Z -submodules of the PHT layer and show how these invariant Z -submodules give potential cryptographic weaknesses. |
|---|---|
| AbstractList | We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z -module. In particular, we consider the invariant Z -submodules of the PHT layer and show how these invariant Z -submodules give potential cryptographic weaknesses. |
| Author | Murphy, Sean |
| Author_xml | – sequence: 1 givenname: Sean surname: Murphy fullname: Murphy, Sean |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=2418936$$DView record in Pascal Francis |
| BookMark | eNp10M1LAzEQBfAgFWyrN70X9Lo6ySQ7yXEprQoFwY_zkk0T2LLu1mR76H_vaoug4Gkuv3k83oSN2q71jF1xuOUAdJcAuFTGAIDMT9iYSxQZR9IjNgaDmAkycMYmKW0GSYpwzC6Ldla0ttmnOs26MHsplovnc3YabJP8xfFO2dty8Tp_yFZP94_zYpU5ROwzJ5UOqKUmVWlE7SvrFAlOZh1IclDK5ARWg_fAvSAeKAe-rlA5EyTmOGXXh9xt7D52PvXlptvFoU0qBWoiLkDAoG6OyiZnmxBt6-pUbmP9buO-FJJr8x2WHZiLXUrRhx_Bofzap_y1z-Dxj3d1b_u6a_to6-afr08TK2R_ |
| CitedBy_id | crossref_primary_10_1016_j_compeleceng_2009_08_004 |
| ContentType | Journal Article |
| Copyright | 1998 INIST-CNRS International Association for Criptologic Research 1998. |
| Copyright_xml | – notice: 1998 INIST-CNRS – notice: International Association for Criptologic Research 1998. |
| DBID | AAYXX CITATION IQODW JQ2 |
| DOI | 10.1007/s001459900046 |
| DatabaseName | CrossRef Pascal-Francis ProQuest Computer Science Collection |
| DatabaseTitle | CrossRef ProQuest Computer Science Collection |
| DatabaseTitleList | ProQuest Computer Science Collection |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Education Applied Sciences |
| EISSN | 1432-1378 |
| EndPage | 251 |
| ExternalDocumentID | 2418936 10_1007_s001459900046 |
| GroupedDBID | -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 199 1N0 1SB 203 28- 29K 2J2 2JN 2JY 2KG 2KM 2LR 2P1 2VQ 2~H 3-Y 30V 4.4 406 408 409 40D 40E 5GY 5QI 5VS 67Z 6NX 6TJ 78A 8TC 8UJ 95- 95. 95~ 96X AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AAOBN AAPKM AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYXX ABAKF ABBBX ABBRH ABBXA ABDBE ABDZT ABECU ABFSG ABFTD ABFTV ABHLI ABHQN ABJCF ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABRTQ ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACIWK ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACSTC ACZOJ ADHHG ADHIR ADHKG ADIMF ADKFA ADKNI ADKPE ADMLS ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AETLH AEVLU AEXYK AEZWR AFBBN AFDZB AFEXP AFFHD AFGCZ AFHIU AFKRA AFLOW AFOHR AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGQPQ AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHPBZ AHSBF AHWEU AHYZX AIAKS AIGIU AIIXL AILAN AITGF AIXLP AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARCSS ARMRJ ASPBG ATHPR AVWKF AXYYD AYFIA AYJHY AZFZN B-. BA0 BBWZM BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU CITATION COF CS3 CSCUP D-I DDRTE DL5 DNIVK DPUIP DU5 EBLON EBS EDO EIOEI EIS EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I-F I09 IHE IJ- IKXTQ ITM IWAJR IXC IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV KOW LAS LLZTM M4Y M7S MA- N2Q N9A NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM P19 P2P P9O PF0 PHGZM PHGZT PQGLB PT4 PT5 PTHSS QOK QOS R4E R89 R9I RHV RNI RNS ROL RPX RSV RZK S16 S1Z S26 S27 S28 S3B SAP SCJ SCLPG SCO SDH SDM SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 ZMTXR ~EX AAYZH AESKC IQODW RIG JQ2 |
| ID | FETCH-LOGICAL-c333t-c458f384875b8338ebac572179df7410559670a80ee01e271f7601db35c9f4363 |
| IEDL.DBID | RSV |
| ISICitedReferencesCount | 5 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000076166200002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0933-2790 |
| IngestDate | Wed Sep 17 23:53:49 EDT 2025 Mon Jul 21 09:15:08 EDT 2025 Sat Nov 29 06:12:29 EST 2025 Tue Nov 18 22:49:44 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 4 |
| Keywords | Markov chain XOR circuit Hadamard transformation Scheduling Encryption Cryptography Message transmission Security key |
| Language | English |
| License | CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c333t-c458f384875b8338ebac572179df7410559670a80ee01e271f7601db35c9f4363 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | http://dx.doi.org/10.1007/s001459900046 |
| PQID | 2387712020 |
| PQPubID | 2043756 |
| PageCount | 17 |
| ParticipantIDs | proquest_journals_2387712020 pascalfrancis_primary_2418936 crossref_primary_10_1007_s001459900046 crossref_citationtrail_10_1007_s001459900046 |
| PublicationCentury | 1900 |
| PublicationDate | 1998-09-01 |
| PublicationDateYYYYMMDD | 1998-09-01 |
| PublicationDate_xml | – month: 09 year: 1998 text: 1998-09-01 day: 01 |
| PublicationDecade | 1990 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: New York |
| PublicationTitle | Journal of cryptology |
| PublicationYear | 1998 |
| Publisher | Springer Springer Nature B.V |
| Publisher_xml | – name: Springer – name: Springer Nature B.V |
| SSID | ssj0017573 |
| Score | 1.5275695 |
| Snippet | We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z -module. In particular, we consider the... |
| SourceID | proquest pascalfrancis crossref |
| SourceType | Aggregation Database Index Database Enrichment Source |
| StartPage | 235 |
| SubjectTerms | Algorithms Applied sciences Cryptography Encryption Exact sciences and technology Information, signal and communications theory Invariants Signal and communications theory Telecommunications and information theory |
| Title | An Analysis of SAFER |
| URI | https://www.proquest.com/docview/2387712020 |
| Volume | 11 |
| WOSCitedRecordID | wos000076166200002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAVX databaseName: Springer BSL Vakbibliotheek customDbUrl: eissn: 1432-1378 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0017573 issn: 0933-2790 databaseCode: RSV dateStart: 19970101 isFulltext: true titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22 providerName: Springer Nature |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF6keBDEVxWrreQgnlzY7WZfxyItnopYld7C7mYXBElLH_5-Z5M0WorQcyYkmSQz3zAz34fQfYC0kzpLsOdO4NQLjrXwFFvJbTAOIiAzpdiEHI_VdKpffkmSdjv4ke6Tplzrcs8RYi0V1Z7W5KPpFkhedZJ11CWTmtRcmjtnb-We47lZghtCpV-xE4rL_DI63fvOztBJDSGTQfXOz9GBLy6i-nI9qdFG7UGRbMhGkllIJoPR8PUSvY-Gb0_PuFY_wI4xtsIu5SowFQsKq6CQ9NY4DvWa1HmQcTiTayGJUcR7Qn1f0hDHW3LLuNMhZYJdoVYxK_w1Sqy3uVHMArbyAI_6WuSUKK0EcVAeEtNBjxu_ZK6mBo8KFV9ZQ2r891E76KExn1ecGP8Z9rac3FgDbACcBMe7G6dn9a-zzABDSEn7AGNv9r3OLTqqVgXj6FcXtVaLte-hQ_e9-lwu7spv5QeCwLAz |
| linkProvider | Springer Nature |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Analysis+of+SAFER&rft.jtitle=Journal+of+cryptology&rft.au=Murphy%2C+Sean&rft.date=1998-09-01&rft.issn=0933-2790&rft.eissn=1432-1378&rft.volume=11&rft.issue=4&rft.spage=235&rft.epage=251&rft_id=info:doi/10.1007%2Fs001459900046&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s001459900046 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0933-2790&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0933-2790&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0933-2790&client=summon |