HomeLOKI97 Online Encryption/Decryption

LOKI97 Online Encryption/Decryption

Australian Block Cipher - 128-bit block, variable key length AES candidate algorithm

Security Notice

LOKI97 was an AES candidate algorithm but was not selected as the standard. For new applications requiring high security, AES (Rijndael) is recommended.

Key Features

128-bit block size, meeting modern security standards
16-round Feistel structure ensures thorough data confusion

LOKI97 supports 128-bit (16 bytes), 192-bit (24 bytes), or 256-bit (32 bytes) keys.
Format Options

About LOKI97 Encryption

LOKI97 is a symmetric key block cipher designed by Lawrie Brown and Josef Pieprzyk in 1997. It was submitted as a candidate algorithm for the Advanced Encryption Standard (AES) competition, representing an evolution of the earlier LOKI89 and LOKI91 ciphers developed in Australia.

The cipher operates on 128-bit data blocks and supports key sizes of 128, 192, or 256 bits. It employs a 16-round Feistel network structure with a complex round function based on S-boxes and permutations, designed to provide strong resistance to differential and linear cryptanalysis.

Key Features

128-bit block size, meeting modern security standards
Flexible key sizes: 128, 192, or 256 bits
16-round Feistel structure ensures thorough data confusion
Designed to resist differential and linear cryptanalysis
Member of the Australian-developed LOKI cipher family

LOKI Family History

  • LOKI89: The original cipher designed in 1989, using 64-bit blocks and 64-bit keys.
  • LOKI91: An improved version that addressed weaknesses in LOKI89.
  • LOKI97: The final evolution with 128-bit blocks, submitted to the AES competition.

Encryption Mode Description

CBC - Cipher Block Chaining: Each plaintext block is XORed with the previous ciphertext block before encryption. Requires IV, most secure for general use.
ECB - Electronic Codebook: Each block is encrypted independently. No IV required, but identical plaintext produces identical ciphertext. Not recommended for sensitive data.
CFB - Cipher Feedback: Converts block cipher to stream cipher. Requires IV, allows encryption of data smaller than block size.
OFB - Output Feedback: Output feedback mode, converts block cipher to stream cipher. Requires IV, ciphertext errors do not propagate.
RAW - Single Block Encryption (16 bytes): Direct block encryption mode without any chaining or feedback mechanism. No IV required. Each block is encrypted independently.

Algorithm Structure

LOKI97 employs a 16-round Feistel network structure. Each round processes a 128-bit block, dividing it into two 64-bit halves (L and R).

Key Schedule

The 256-bit master key is expanded into 48 subkeys (SK[0] to SK[47]) through the f function and constant DELTA (derived from the golden ratio). For 128-bit or 192-bit keys, key material is replicated to fill the 256-bit key register before expansion.

Round Function

Each round applies: L' = R + SK[3i], R' = L XOR f(R + SK[3i], SK[3i+1], SK[3i+2]). Addition is modulo 2^64.

f Function

The core f function f(A, B) consists of four layers:

  • KP (Keyed Permutation): Selects bits from A based on control bits in B
  • Sa (S-box layer a): Eight parallel S-box lookups using two types (S1: 13→8 bits, S2: 11→8 bits)
  • P (Permutation): 64-bit permutation using 8×8 bit interleaving pattern
  • Sb (S-box layer b): Second round of eight S-box lookups using additional key material from B

S-boxes

S1 has 8192 entries (13-bit input→8-bit output), S2 has 2048 entries (11-bit input→8-bit output). Both are computed using cubic operations in GF(2^13) and GF(2^11) respectively, with specific generator polynomials to ensure strong nonlinearity.

Decryption Process

Decryption uses the same structure but applies subkeys in reverse order (from SK[47] to SK[0]) and uses subtraction instead of addition.

Algorithm Comparison

AlgorithmKey LengthBlock SizeSecuritySpeed
LOKI97128/192/256 bits128 bitsGoodMedium
AES128/192/256 bits128 bitsExcellentFast
Serpent128/192/256 bits128 bitsExcellentMedium
DES56 bits64 bitsWeakFast

Security Considerations

LOKI97 provides good security, with no practical attacks found against the full cipher
128-bit block size meets modern security requirements
Although not selected as AES, LOKI97 remains cryptographically sound
For new applications, AES is recommended as the international standard

Use Cases

Legacy system compatibility and historical research
Cryptography education and algorithm research
Comparative analysis with other AES candidate algorithms
Applications requiring Australian-developed cryptography

References

Wikipedia - LOKI Cipher
NIST AES Development Process

Data is processed locally in your browser by default and will not be uploaded to any server. Upload will be clearly indicated if required.

© 2026 See-Tool. All rights reserved. | Contact Us