Abstract
This paper provides an overview of the LOKI encryption primitive which may be used to encrypt and decrypt a 64-bit block of data using a 64-bit key. The LOKI primitive may be used in any mode of operation currently defined for ISO DEA-1, with which it is interface compatible [AAAA83]. Also described are two modes of operation of the LOKI primitive which compute a 64-bit, and 128-bit, Message Authentication Code (or hash value). These modes of operation may be used to provide authentication of a communications session, or of data files.
Preview
Unable to display preview. Download preview PDF.
Bibliography
"Information Interchange — Data Encryption Algorithm — Modes of Operation," American National Standards Institute X3.106-1983, American National Standards Institute, New York, 1983.
L. Brown, "A Proposed Design for an Extended DES," in Proc. Fifth International Conference and Exhibition on Computer Security, IFIP, Gold Coast, Queensland, Australia, 19–21 May, 1988.
L. Brown and J. Seberry, "On the Design of Permutation P in DES Type Cryptosystems" in Abstracts of Eurocrypt 89, IACR, Houthalen, Belgium, 10–13 Apr., 1989.
L. Brown and J. Seberry, "Key Scheduling in DES Type Cryptosystems," accepted for presentation at Auscrypt90, ADFA, Sydney, Australia, Jan. 1990.
D. W. Davies and W. L. Price, Security for Computer Networks, John Wiley and Sons, New York, 1984.
J. Pieprzyk and G. Finkelstein, "Permutations that Maximize Non-Linearity and Their Cryptographic Significance," in Proc. Fifth Int. Conf. on Computer Security — IFIP SEC '88, IFIP TC-11, Gold Coast, Queensland, Australia, 19–21 May 1988.
J. Pieprzyk, "Non-Linearity of Exponent Permutations," in Abstracts of Eurocrypt 89, IACR, Houthalen, Belgium, 10–13 Apr., 1989.
J. Pieprzyk and J. Seberry, "Remarks on Extension of DES — Which Way to Go?," Tech. Rep. CS89/4, Dept. of Computer Science, UC UNSW, Australian Defence Force Academy, Canberra, Australia, Feb. 1989.
J. Pieprzyk, "Error Propagation Property and Application in Cryptography," IEEE Proceedings-E, Computers and Digital Techniques, vol. 136, no. 4, pp. 262–270, July 1989.
J. Quisquater and M. Girault, "2n-Bit Hash Functions Using n-Bit Symmetric Block Cipher Algorithms," in Abstracts of Eurocrypt 89, p. 4.5, IACR, Houthalen, Belgium, 10–13 Apr., 1989.
J. Vandewalle, D. Chaum, W. Fumy, C. Janssen, P. Landrock and G. Roelofsen, "A European Call for Cryptographic Algorithms: RIPE RACE Integrity Primitives Evaluation," in Abstracts of Eurocrypt 89, p. 6.6, IACR, Houthalen, Belgium, 10–13 Apr., 1989.
R. S. Winternitz, "Producing a One-Way Hash Function from DES," in Advances in Cryptology — Proc. of Crypto 83, D. Chaum, R. L. Rivest and A. T. Sherman (editors), pp. 203–207, Plenum Press, New York, Aug. 22–24, 1983.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1990 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brown, L., Pieprzyk, J., Seberry, J. (1990). LOKI — A cryptographic primitive for authentication and secrecy applications. In: Seberry, J., Pieprzyk, J. (eds) Advances in Cryptology — AUSCRYPT '90. AUSCRYPT 1990. Lecture Notes in Computer Science, vol 453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0030364
Download citation
DOI: https://doi.org/10.1007/BFb0030364
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-53000-8
Online ISBN: 978-3-540-46297-2
eBook Packages: Springer Book Archive