Advertisement

On Cipher Design Based on Switchable Controlled Operations

  • Nikolay A. Moldovyan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2776)

Abstract

This paper introduces a new type of primitives called switchable controlled operations (SCO). The SCO are proposed to be used in the design of the fast ciphers suitable to cheap-hardware implementation. Use of the SCO promotes to solve the problem of the weak keys and homogeneity of the encryption transformation while the simple key scheduling is used. The SCO-based iterative ciphers that are free of reversing the key scheduling are proposed to minimize implementation cost. Different variants of SCO and SCO-based iterative cryptoschemes are considered.

Keywords

Fast Encryption Data-Dependent Operations Hardware-Oriented Ciphers Switchable Operations Controlled Operations 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Biryukov, A., Wagner, D.: Advanced Slide Attacks. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 589–606. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  2. 2.
    Eremeev, M.A., Moldovyan, A.A., Moldovyan, N.A.: Data Encryption Transformations Based on New Primitive. Avtomatika i Telemehanika (Russian Academy of Sciences) 12, 35–47 (2002)Google Scholar
  3. 3.
    Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Modern Cryptography: Protect Your Data with Fast Block Ciphers. In: Wayne, p. 400. A-LIST Publishing (2003)Google Scholar
  4. 4.
    Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast Encryption Algorithm SPECTRH64. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 275–286. Springer, Heidelberg (2001)Google Scholar
  5. 5.
    Ichikawa, T., Kasuya, T., Matsui, M.: Hardware Evaluation of the AES Finalists. In: 3rd AES Confer. Proc., New York, NY, USA, 13-14 April (2000), http://www.nist.gov/aes
  6. 6.
    Moldovyan, A.A., Moldovyan, N.A.: A Cipher Based on Data-Dependent Permutations. Journal of Cryptology 15(1), 61–72 (2002)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Waksman, A.A.: Permutation Network. Journal of the ACM 15(1), 159–163 (1968)zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Nikolay A. Moldovyan
    • 1
  1. 1.Specialized Center of Program System “SPECTR”St. PetersburgRussia

Personalised recommendations