Abstract
Cryptosystems can be viewed as sets of permutations from which one permutation is chosen as cryptofunction by specifying a key. Interconnection networks have been widely studied in the field of parallel processing. They have one property that makes them very interesting for cryptology, i.e. they give the opportunity to access and perform permutations at the same time. This paper presents two examples of how cryptology can benefit from the use of interconnection networks. One is a new construction of a pseudo-random permutation (generator) from one single pseudo-random function (generator). The search for such constructions has been of major interest since Luby and Rackoff gave the first construction in 1986. The second example presents a cryptosystem based on interconnection networks and a certain class of boolean functions. Some arguments for its security are given. Although there is a relation between the two examples they complement each other in using different properties of interconnection networks. This can be regarded as an argument that exploiting the full potential of interconnection networks can establish completely new techniques in cryptology.
Chapter PDF
Similar content being viewed by others
8 Literature
L. Blum, M. Blum, M. Shub: “A simple unpredictable pseudo-random number generator”, SIAM Journal on Computing, Vol. 15, 1986, pp. 364–383
V.E. Benes: “Mathematical theory of connecting networks and telephone traffic”, Academic Press, New York, 1965
T. Beth, P. Horster, M. Portz: “Verbindungsnetzwerke in der Kryptologie”; to appear as report of the European Institute for System Security (E.I.S.S.)
Tse-yun Feng: “A survey of interconnection networks”; Computer: IE3; Dec 1981, pp. 12–27
O. Goldreich, S. Goldwasser, S. Micali: “How to construct random functions”; Journal of the ACM, Vol. 33, No. 4, Oct. 1986, pp. 792–807
S. Lloyd: “Counting Functions satisfying a higher order strict avalanche criterion”; Advances in Cryptology-EUROCRYPT’ 89, Lecture Notes in Computer Science 434, Springer Verlag, 1990
M. Luby, C. Rackoff: “Pseudo-random permutation generators and cryptographic composition”; Proceedings of the 18th ACM Symposium on the Theory of Computing, ACM, 1986, pp. 356–363
M. Luby, C. Rackoff: “How to construct pseudo-random permutations from pseudorandom functions”; SIAM Journal of Computing, Vol. 17(2), 1988, pp. 373–386
D.C. Opferman, N.T. Tsao-Wu: “On a class of rearrangeable switching networks” “Part I: Control Algorithm”; The Bell System Technical Journal, Vol. 50, No. 5, May–June 1971, pp. 1579–1600; “Part II: Enumeration Studies and Fault Diagnosis”; The Bell System Technical Journal, Vol. 50, No. 5, May–June 1971, pp. 1601–1618
Y. Ohnishi: “A study on data security”; Master Thesis (in Japanese); Tohoku University, Japan, 1988
J. Pieprzyk: “How to construct pseudorandom permutations from single pseudorandom functions”; Advances in Cryptology-EUROCRYPT’ 90, Lecture Notes in Computer Science 473, Springer Verlag, 1991
M. Portz: “A new class of cryptosystems based on interconnection networks”; Aachener Informatik-Berichte, Nr. 91-4, RWTH Aachen, Fachgruppe Informatik; ISSN 0935-3232, 1991
C.P. Schnorr: “On the construction of random number generators and random function generators”; Advances in Cryptology-EUROCRYPT’ 88, Lecture Notes in Computer Science 330, Springer Verlag, 1989
A. Waksman: “A permutation network”; Journal of the ACM, Vol. 15, No. 1, Jan. 1968, pp. 159–163
Y. Zheng, T. Matsumoto, H. Imai: “On the construction of block ciphers provably secure and not relying on any unproved hypothesis”; Advances in Cryptology-CRYPTO 89; Lecture Notes in Computer Science 435; Springer; 1990
A.C. Yao: “Theory and application of trapdoor functions”; Proceedings of the 23rd IEEE Symposium on Foundation of Computer Science, New York, 1982
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Portz, M. (1991). On the Use of Interconnection Networks in Cryptography. In: Davies, D.W. (eds) Advances in Cryptology — EUROCRYPT ’91. EUROCRYPT 1991. Lecture Notes in Computer Science, vol 547. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46416-6_26
Download citation
DOI: https://doi.org/10.1007/3-540-46416-6_26
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54620-7
Online ISBN: 978-3-540-46416-7
eBook Packages: Springer Book Archive