SAFER (Secure And Fast Encryption Routine
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator
******

Posts: 3,048
Joined: Dec 2008
#1
03-09-2009, 05:43 PM


SAFER


In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf of Cylink Corporation. The early SAFER K and SAFER SK function, but differ in the number of rounds and the designs share the same encryptionkey schedule. More recent versions ” SAFER+ and SAFER++ ” were submitted as candidates to the AES process and the NESSIE project and implimentation respectively. All of the algorithms in the SAFER family are unpatented and available for unrestricted use.

The first SAFER cipher was SAFER K-64, published by Massey in 1993, with a 64-bit block size. The 'K-64' denotes a key size of 64 bits. There was some demand for a version with a larger 128-bit key, and the following year Massey published such a variant incorporating new key schedule designed by the Singapore Ministry for Home affairs: SAFER K-128. However, both Lars Knudsen and Sean Murphy found minor weaknesses in this version, prompting a redesign of the key schedule to one suggested by Knudsen; these variants were named SAFER SK-64 and SAFER SK-128 respectively ” the 'SK' standing for 'Strengthened Key schedule', though the RSA FAQ reports that, 'one joke has it that SK really stands for 'Stop Knudsen', a wise precaution in the design of any block cipher'. Another variant with a reduced key size was published, SAFER SK-40, to comply with 40-bit export restrictions.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Biometric in secure e-transaction Abstract study tips 0 670 19-06-2013, 12:30 PM
Last Post: study tips
  Fast Search Strategies for Fractal Image Compression ppt seminar flower 1 1,276 23-03-2013, 11:25 AM
Last Post: Guest
  Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing seminar class 2 3,916 15-03-2013, 11:20 AM
Last Post: srinivas17
  Information server Fast track seminar tips 0 646 23-02-2013, 04:48 PM
Last Post: seminar tips
  A Secure Recognition Based Graphical Password by Watermarking seminar tips 0 983 18-01-2013, 03:37 PM
Last Post: seminar tips
  Design of a robust and secure digital signature scheme for image authentication seminar flower 1 978 07-11-2012, 11:59 AM
Last Post: Guest
  DEAL (Data Encryption Algorithm with Larger blocks) computer science crazy 1 1,880 03-08-2012, 10:58 AM
Last Post: seminar ideas
  SECURE VIRTUAL MACHINE EXECUTION UNDER AN UNTRUSTED MANAGEMENT OS seminar flower 0 788 29-06-2012, 02:15 PM
Last Post: seminar flower
  A Change Information Based Fast Algorithm for Video Object Detection and Tracking seminar ideas 0 483 10-05-2012, 05:17 PM
Last Post: seminar ideas
  A SECURE CROSS LAYER MULTIPATH ROUTING FOR MD VIDEO IN WIRELESS MESH NETWORK seminar paper 0 570 09-04-2012, 03:58 PM
Last Post: seminar paper