Abstract
Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length. It is shown that CTPO in combination with the controlled permutations (CP) can be efficiently used to construct fast block ciphers. Three different cryptoschemes based on data-dependent two-place operations and data-dependent permutations are presented. A feature of the cryptoschemes is the use of the CTPO and CP for construction of some mechanisms of the internal key scheduling which consists in data-dependent transformation of the round keys.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Becker, W.: Method and System for Machine Enciphering and Deciphering. U.S.Patent. 4157454 (1979)
Madryga, W.E.: A High Performance Encryption Algorithm. Computer security: a global challenge, Elsevier Science Publishers (1984) 557–570
Rivest, R.L.: The RC5 Encryption Algorithm. Fast Software Encryption — FSE’94 Proceedings. Springer-Verlag LNCS. Vol. 1008 (1995) 86–96
Rivest, R.L., Robshaw, M.J.B., Sidney, R. and Yin, Y.L.: The RC6 Block Cipher. Proceedings of the 1st Advanced Encryption Standard Candidate Conference. Venture, California (Aug. 20–22, 1998) (http://www.nist.gov/aes)
Burwick, C., Coppersmith, D., D’Avingnon, E., Gennaro, R., Halevi, Sh., Jutla, Ch., Matyas,Jr. S.M., O’Connor, L., Peyravian, M., Safford, D., and Zunic, N.: MARS — a Candidate Cipher for AES. Proceedings of 1st Advanced Encryption Standard Candidate Conference. Venture, California (Aug. 20–22, 1998)
Benes, V.E.: Mathematical Theory of Connecting Networks and Telephone Traffic, Academic Press, New York (1965)
Waksman, A.A.: Permutation Network. Journal of the ACM, Vol. 15.1 (1968) 159–163
Portsa, M.: On the Use of Interconnection Networks in Cryptography. Advances in Cryptology-EUROCRYT’91 Proceedings. Springer Verlag LNCS, Vol. 547. (1991) 302–315
Goots, N.D., Moldovyan, A.A., Moldovyan, A.A.: Fast Encryptuion Algorithm SPECTRH64. International Workshop Mathematical Methods, Models and Architectures for Computer Network Security — MMM-2001 Proceedings. Springer Verlag LNCS. This vol. (2001)
Moldovyan, A.A., Moldovyan, N.A. and Moldovyanu, P.A.: A Method of the Block Cryptographical Transformation of the Binary Information. Russian patent 2141729. Bull. no 32 (1999)
Maslovsky, V.M., Moldovyan, A.A., and Moldovyan, N.A.: A Method of the Block Encryption of Discrete Data. Russian patent 2140710. Bull. no 30 (1999)
Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Design of the Controlled Two-place Operations for Fast Flexible Cryptosystems, Security of the Information Technologies, MIPhI, 4 (2000, in Russian)
Biham, E., and Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag (1993)
Nyberg, K.: Differentially Uniform Mappings for Cryptography. Advances in Cryptology-EUROCRYT’93 Proceedings. Springer Verlag LNCS. Vol. 765 (1994) 55–64
Matsui, M.: Linear Cryptoanalysis Method for DES Cipher. Advances in Cryptology — EUROCRYT’93 Proceedings. Springer Verlag LNCS. Vol. 765 (1994) 386–397
Nyberg, K.: Linear Approximations of Block Ciphers. Advances in Cryptology — EUROCRYT’94 Proceedings. Springer Verlag LNCS. Vol. 950 (1994) 139–144
Nyberg, K.: Constructions of Bent Functions and Difference Sets. Advances in Cryptology-EUROCRYT’90 Proceedings. Springer Verlag LNCS. Vol. 473 (1991) 151–160
Kurosawa, K., Satoh T.: Desigh of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria. Advances in Cryptology-EUROCRYT’97 Proceedings. Springer Verlag LNCS (1998) 434–449
Nyberg, K., Knudsen, L.: Provable Security Against a Differential Attack. Advances in Cryptology — CRYPTO’92 Proceedings. Springer Verlag LNCS. Vol. 740 (1994) 566–574
Lai, X., Massey, J.L.: Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology-EUROCRYT’91 Proceedings. Springer Verlag LNCS. Vol. 547 (1992) 17–38
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A. (2001). Controlled Operations as a Cryptographic Primitive. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_23
Download citation
DOI: https://doi.org/10.1007/3-540-45116-1_23
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42103-0
Online ISBN: 978-3-540-45116-7
eBook Packages: Springer Book Archive