SAFER (Secure And Fast Encryption Routine)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar projects crazy
Active In SP

Posts: 604
Joined: Dec 2008
13-06-2009, 03:41 PM

In cryptography, SAFER (Secure And Fast Encryption Routine) is the name of a family of block ciphers designed primarily by James Massey (one of the designers of IDEA) on behalf of Cylink Corporation. The early SAFER K and SAFER SK function, but differ in the number of rounds and the designs share the same encryptionkey schedule. More recent versions € SAFER+ and SAFER++ were submitted as candidates to the AES process and the NESSIE project and implimentation respectively. All of the algorithms in the SAFER family are unpatented and available for unrestricted use.

The first SAFER cipher was SAFER K-64, published by Massey in 1993, with a 64-bit block size. The K-64 denotes a key size of 64 bits. There was some demand for a version with a larger 128-bit key, and the following year Massey published such a variant incorporating new key schedule designed by the Singapore Ministry for Home affairs: SAFER K-128. However, both Lars Knudsen and Sean Murphy found minor weaknesses in this version, prompting a redesign of the key schedule to one suggested by Knudsen; these variants were named SAFER SK-64 and SAFER SK-128 respectively € the SK standing for Strengthened Key schedule , though the RSA FAQ reports that, one joke has it that SK really stands for Stop Knudsen , a wise precaution in the design of any block cipher . Another variant with a reduced key size was published, SAFER SK-40, to comply with 40-bit export restrictions.

All of these ciphers use the same round function consisting of four stages, as shown in the diagram: a key-mixing stage, a substitution layer, another key-mixing stage, and finally a diffusion layer. In the first key-mixing stage, the plaintext block is divided into eight 8-bit segments, and subkeys are added using either addition modulo 256 (denoted by a + in a square) or XOR (denoted by a + in a circle). The substitution layer consists of two S-boxes, each the inverse of each other, derived from discrete exponentiation (45x) and logarithm (log45x) functions. After a second key-mixing stage there is the diffusion layer: a novel cryptographic component termed a pseudo-Hadamard transform (PHT). (The PHT was also later used in the Twofish cipher.)
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar surveyer
Active In SP

Posts: 3,541
Joined: Sep 2010
14-10-2010, 11:32 AM

.docx   SEMINAR-THEORY.docx (Size: 24.46 KB / Downloads: 67)


This algorithm is of interest for several reasons. It is designed for use in software. Unlike DES, or even IDEA, it does not divide the block into parts of which some parts affect others; instead, the plaintext is directly changed by going through S-boxes, which are replaced by their inverses for decryption.
Description of SAFER
SAFER uses eight rounds. The first step for a round is to apply the first subkey for the round to the eight bytes of the block. The operation by which each byte of the subkey is applied to each byte of the block depends on which byte is used: the sequence is
XOR, add, add, XOR, XOR, add, add, XOR
Then, the S-box is used. Those bytes to which the subkey was applied by an XOR go through the regular S-box; those bytes to which it was applied by addition go through the inverse S-box.

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: secure and fast encryption routine encryption and decryption algorithm pdf, secure and fast encryption routine ppt, safer encryption algorithm, safer secure and fast encryption routine, computer science security ppt twofish, safer encryption, secure and fast encryption routine encryption and decryption algorithm,
Popular Searches: full project report of data encryption and decryption, moddes encryption, interrupt service routine interview questions and answers, data encryption project c, download attacking block ciphers pdf, ieee papers on encryption for free download, seminar reports on image encryption pdf,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  secure atm by image processing jaseelati 0 268 10-02-2015, 01:33 PM
Last Post: jaseelati
  secure atm by image processing abstract jaseelati 0 334 23-01-2015, 03:08 PM
Last Post: jaseelati
  Privacy-Preserving Public Auditing for Secure Cloud Storage seminar ideas 4 1,288 13-09-2014, 02:35 PM
Last Post: Radhika.m
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,192 13-05-2014, 10:16 AM
Last Post: seminar project topic
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,112 24-03-2014, 02:51 PM
Last Post: seminar project topic
  XML encryption full report computer science technology 7 6,632 24-03-2014, 02:31 PM
Last Post: seminar project topic
  Open Secure Shell seminar ideas 4 4,073 27-09-2013, 10:05 AM
Last Post: seminar projects maker
  Fast algorithms for solving H∞-norm minimization problems pdf seminar projects maker 0 302 23-09-2013, 04:31 PM
Last Post: seminar projects maker
  Report on 3-D Secure seminar projects maker 0 362 21-09-2013, 04:46 PM
Last Post: seminar projects maker
Music SILC(Secure Internet Live conferencing) Download The Seminar Report computer science crazy 11 7,190 31-08-2013, 12:20 PM
Last Post: study tips