Skip to main content

Fast Encryption Algorithm Spectr-H64

  • Conference paper
  • First Online:
Information Assurance in Computer Networks (MMM-ACNS 2001)

Abstract

This paper describes a fast hardware-oriented 64-bit block cipher SPECTR-H64 based on combination of the data-dependent permutations and data-dependent transformation of subkeys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Rivest, R.L.: The RC5 Encryption Algorithm. Fast Software Encryption — FSE’94 Proceedings. Springer-Verlag, LNCS Vol. 1008. (1995) 86–96

    Google Scholar 

  2. Kaliski, B.S. and Yin, Y.L.: On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm. Advances in Cryptology — CRYPTO’95 Proceedings. Springer-Verlag, LNCS Vol. 963. (1995) 171–184

    Google Scholar 

  3. Biryukov, A., Kushilevitz, E.: Improved Cryptanalysis of RC5. Advances in Cryptology — Eurocrypt’98 Proceedings. Springer-Verlag, LNCS Vol. 1403. (1998) 85–99

    Google Scholar 

  4. Rivest, R.L., Robshaw, M.J.B., Sidney, R., Yin, Y.L.: The RC6 Block Cipher. Proceeding of 1st Advanced Encryption Standard Candidate Conference, Venture, California, (Aug 20–22 1998) (http://www.nist.gov/aes)

  5. Burwick, C., Coppersmith, D., D’Avingnon, E., Gennaro, R., Halevi, Sh., Jutla, Ch., MatyasJr., S.M., O’Connor, L., Peyravian, M., Safford, D., Zunic, N.: MARS — a Candidate Cipher for AES. Proceeding of 1st Advanced Encryption Standard Candidate Conference, Venture, California, (Aug 20–22 1998) (http://www.nist.gov/aes)

  6. Moldovyan, A.A., Moldovyan, N.A.: A Method of the Cryptographical Transformation of Binary Data Blocks. Russian patent, N 2141729. Bull. N. 32. (Nov 20 1999)

    Google Scholar 

  7. Benes, V.E.: Mathematical Theory of Connecting Networks and Telephone Traffic. Academic Press, New York (1965)

    MATH  Google Scholar 

  8. Waksman, A.A.: Permutation Network, Journal of the ACM. Vol.15,no 1 (1968) 159–163

    Article  Google Scholar 

  9. Kawn, M.: The Design of the ICE Encryption Algorithm. Fast Software Encryption — FSE’97 Proceedings. Springer-Verlag, LNCS Vol. 1267. (1997) 69–82

    Chapter  Google Scholar 

  10. Van Rompay, L.R. Knudsen, V.: Rijmen Differential Cryptanalysis of the ICE Encryption Algorithm, Fast Software Encryption — FSEc98 Proceeding. Springer-Verlag LNCS Vol. 1372. (1998) 270–283

    Chapter  Google Scholar 

  11. Maslovsky, V.M., Moldovyan, A.A., Moldovyan, N.A.: A Method of the Block Encryption of Discrete Data. Russian patent, N 2140710. Bull. N. 30 (Oct 27 1999)

    Google Scholar 

  12. Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Design of two place operation for fast flexible cryptosystems. Bezopasnosti informatsionnyh tehnologii, Moscow, MIFI, no 4 (2000, in Russian)

    Google Scholar 

  13. Goots, N.D., Izotov, B.V., Moldovyan, N.A.: Controlled permutations with symmetric structure in block ciphers, Voprosy zaschity informatsii, Moscow, VIMI,no 4 (2000) 57–65 (in Russian).

    Google Scholar 

  14. Nyberg, K.: Constructions of Bent Functions and Difference Sets, Advances in Cryptology — Eurocrypt’90 Proceedings. Springer Verlag (1991) 151–160

    Google Scholar 

  15. Preneel, B., Bosselaers, A., Rijmen, V., Van Rompay, B., Granboulan, L., Stern, J., Murphy, S., Dichtl, M., Serf, P., Biham, E., Dunkelman, O., Furman, V., Koeune, F., Piret, G., Quisquater, J-J., Knudsen, L., Raddum, H.: Comments by the NESSIE Project on the AES Finalists. (24 may 2000) (http://www.nist.gov/aes)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Goots, N.D., Moldovyan, A.A., Moldovyan, N.A. (2001). Fast Encryption Algorithm Spectr-H64. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-45116-1_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42103-0

  • Online ISBN: 978-3-540-45116-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics