Advertisement

Fast Encryption Algorithm Spectr-H64

  • Nick D. Goots
  • Alexander A. Moldovyan
  • Nick A. Moldovyan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2052)

Abstract

This paper describes a fast hardware-oriented 64-bit block cipher SPECTR-H64 based on combination of the data-dependent permutations and data-dependent transformation of subkeys.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Rivest, R.L.: The RC5 Encryption Algorithm. Fast Software Encryption — FSE’94 Proceedings. Springer-Verlag, LNCS Vol. 1008. (1995) 86–96Google Scholar
  2. 2.
    Kaliski, B.S. and Yin, Y.L.: On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm. Advances in Cryptology — CRYPTO’95 Proceedings. Springer-Verlag, LNCS Vol. 963. (1995) 171–184Google Scholar
  3. 3.
    Biryukov, A., Kushilevitz, E.: Improved Cryptanalysis of RC5. Advances in Cryptology — Eurocrypt’98 Proceedings. Springer-Verlag, LNCS Vol. 1403. (1998) 85–99Google Scholar
  4. 4.
    Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 Block Cipher. Proceeding of 1st Advanced Encryption Standard Candidate Conference, Venture, California, (Aug 20–22 1998) (http://www.nist.gov/aes)
  5. 5.
    Burwick, C., Coppersmith, D., D’Avingnon, E., Gennaro, R., Halevi, Sh., Jutla, Ch., MatyasJr., S.M., O’Connor, L., Peyravian, M., Safford, D., Zunic, N.: MARS — a Candidate Cipher for AES. Proceeding of 1st Advanced Encryption Standard Candidate Conference, Venture, California, (Aug 20–22 1998) (http://www.nist.gov/aes)
  6. 6.
    Moldovyan, A.A., Moldovyan, N.A.: A Method of the Cryptographical Transformation of Binary Data Blocks. Russian patent, N 2141729. Bull. N. 32. (Nov 20 1999)Google Scholar
  7. 7.
    Benes, V.E.: Mathematical Theory of Connecting Networks and Telephone Traffic. Academic Press, New York (1965)zbMATHGoogle Scholar
  8. 8.
    Waksman, A.A.: Permutation Network, Journal of the ACM. Vol.15,no 1 (1968) 159–163CrossRefGoogle Scholar
  9. 9.
    Kawn, M.: The Design of the ICE Encryption Algorithm. Fast Software Encryption — FSE’97 Proceedings. Springer-Verlag, LNCS Vol. 1267. (1997) 69–82CrossRefGoogle Scholar
  10. 10.
    Van Rompay, L.R. Knudsen, V.: Rijmen Differential Cryptanalysis of the ICE Encryption Algorithm, Fast Software Encryption — FSEc98 Proceeding. Springer-Verlag LNCS Vol. 1372. (1998) 270–283CrossRefGoogle Scholar
  11. 11.
    Maslovsky, V.M., Moldovyan, A.A., Moldovyan, N.A.: A Method of the Block Encryption of Discrete Data. Russian patent, N 2140710. Bull. N. 30 (Oct 27 1999)Google Scholar
  12. 12.
    Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Design of two place operation for fast flexible cryptosystems. Bezopasnosti informatsionnyh tehnologii, Moscow, MIFI, no 4 (2000, in Russian)Google Scholar
  13. 13.
    Goots, N.D., Izotov, B.V., Moldovyan, N.A.: Controlled permutations with symmetric structure in block ciphers, Voprosy zaschity informatsii, Moscow, VIMI,no 4 (2000) 57–65 (in Russian).Google Scholar
  14. 14.
    Nyberg, K.: Constructions of Bent Functions and Difference Sets, Advances in Cryptology — Eurocrypt’90 Proceedings. Springer Verlag (1991) 151–160Google Scholar
  15. 15.
    Preneel, B., Bosselaers, A., Rijmen, V., Van Rompay, B., Granboulan, L., Stern, J., Murphy, S., Dichtl, M., Serf, P., Biham, E., Dunkelman, O., Furman, V., Koeune, F., Piret, G., Quisquater, J-J., Knudsen, L., Raddum, H.: Comments by the NESSIE Project on the AES Finalists. (24 may 2000) (http://www.nist.gov/aes)

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Nick D. Goots
    • 1
  • Alexander A. Moldovyan
    • 1
  • Nick A. Moldovyan
    • 1
  1. 1.Specialized Center of Program Systems “SPECTR”St. PetersburgRussia

Personalised recommendations