The cipher family SPEED (and an associated hashing mode) was recently proposed in Financial Cryptography '97. In cryptanalyzing the cipher we found several troubling potential weaknesses. Next, we were able to efficiently break the SPEED hashing mode using differential related-key techniques. Finally, we examined differential attacks against the 48-round version of SPEED. These results raise some significant questions about the security of the SPEED design.
CITATION STYLE
Hall, C., Kelsey, J., Schneier, B., & Wagner, D. (1998). Cryptanalysis of SPEED. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1465, pp. 309–310). Springer Verlag. https://doi.org/10.1007/BFb0055491
Mendeley helps you to discover research relevant for your work.