Skip to main content

A Layered Broadcast Cryptographic System

  • Chapter
Advances in Cryptology

Abstract

A new type of cryptosystem is presented that may find application in broadcast communication networks and database systems. To date, all proposals for such systems have either been shown to be weak under cryptanalytic attack or to possess undesirable characteristics such as data expansion. The new scheme is a layered system that is a concatenation of SP-networks and Hill broadcast encryption and is referred to as an SP-Hill cryptosystem. Tests carried out on it indicate that the scheme performs well cryptographically.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Davida, G.I., Wells, D.L. and Kam, J.B., “A Database System with Subkeys”, ACM Trans. on Data-base Systems, Vol. 6, Jun. 1981, pp. 312–328.

    Article  Google Scholar 

  2. Even, S. and Goldreich, O., “On the power of cascade ciphers”, presented at CRYPTO 83, Santa Barbara, CA, Aug. 22–24, 1983.

    Google Scholar 

  3. Feistel, H., “Cryptography and Computer Privacy”, Sci. American, Vol. 228, May 1973, pp. 15–23.

    Article  Google Scholar 

  4. Hellman, M.E., “Another Cryptanalytic Attack on ‘A Cryptosystem for Multiple Communication’”, Info. Proc. Lett., Vol. 12, Aug. 1981, pp. 182–183

    Article  Google Scholar 

  5. Kam, J.B. and Davida, G.I., “Structural Design of Substitution-Permutation Encryption Networks”, IEEE Trans. on Computers, Vol. C-28, Oct. 1979, pp. 747–753.

    Article  Google Scholar 

  6. Konheim, A.G., “Cryptography: A Primer”, John Wiley and Sons, New York, 1981.

    Google Scholar 

  7. Lee, L.N. and Lu, S.C., “A Multiple-destination Cryptosystem for Broadcast Channels”, COMSAT Tech. Review, Vol. 9, 1979, pp. 25–35.

    Google Scholar 

  8. Lempel, A. and Ziv, J., “On the Complexity of Finite Sequences”. IEEE Trans. on Info. Theory, Vol. IT-22, Jan. 1976, pp. 75–81.

    Article  Google Scholar 

  9. Luccio, F. and Mazzone, S., “A Cryptosystem for Multiple Communication”, Info. Proc. Lett., Vol. 10, Jul. 1981, pp. 180–183.

    Article  Google Scholar 

  10. Meijer, H., A Note on “A Cryptosystem for Multiple Communication”, Info. Proc. Lett., Vol. 12, 1981, pp. 179–181.

    Article  Google Scholar 

  11. National Bureau of Standards (US), “The Data Encryption Standard”, Federal Info. Proc. Standards Publ. FIPS PUB 46, Nat. Tech. Info. Service, Springfield, VA., 1977.

    Google Scholar 

  12. Papoulis, A., Probability, Random Variables, and Stochastic Processes, McGraw-Hill, 1965.

    Google Scholar 

  13. Shannon, C.E., “Communication Theory of Secrecy Systems”, Bell Syst. Tech. J., Vol. 28, Oct. 1949, pp. 656–715.

    Google Scholar 

  14. Spencer, M.E. and Tavares, S.E., “Layered Multi-User Cryptosystems”, IEEE Canadian Commun. and Energy Conf., Oct. 1982, Proc. pp. 379–382.

    Google Scholar 

  15. Spencer, M.E., “Layered Broadcast Cryptosystems”, M.Sc. Thesis, Dept. of Elec. Eng., Queen’s University, Kingston, Ont., Apr. 1983.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1984 Plenum Press, New York

About this chapter

Cite this chapter

Spencer, M.E., Tavares, S.E. (1984). A Layered Broadcast Cryptographic System. In: Chaum, D. (eds) Advances in Cryptology. Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-4730-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-1-4684-4730-9_15

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4684-4732-3

  • Online ISBN: 978-1-4684-4730-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics