The cipher family SPEED (and an associated hashing mode) was recently proposed in Financial Cryptography ’97. This paper cryptanalyzes that proposal, in two parts: First, we discuss several troubling potential weaknesses in the cipher. Next, we show how to efficiently break the SPEED hashing mode using differential related-key techniques, and propose a differential attack on 48-round SPEED. These results raise some significant questions about the security of the SPEED design.
CITATION STYLE
Hall, C., Kelsey, J., Rijmen, V., Schneier, B., & Wagner, D. (1999). Cryptanalysis of SPEED. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1556, pp. 319–338). Springer Verlag. https://doi.org/10.1007/3-540-48892-8_25
Mendeley helps you to discover research relevant for your work.