Skip to main content

Controlled Operations as a Cryptographic Primitive

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2052))

Abstract

Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length. It is shown that CTPO in combination with the controlled permutations (CP) can be efficiently used to construct fast block ciphers. Three different cryptoschemes based on data-dependent two-place operations and data-dependent permutations are presented. A feature of the cryptoschemes is the use of the CTPO and CP for construction of some mechanisms of the internal key scheduling which consists in data-dependent transformation of the round keys.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   64.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Becker, W.: Method and System for Machine Enciphering and Deciphering. U.S.Patent. 4157454 (1979)

    Google Scholar 

  2. Madryga, W.E.: A High Performance Encryption Algorithm. Computer security: a global challenge, Elsevier Science Publishers (1984) 557–570

    Google Scholar 

  3. Rivest, R.L.: The RC5 Encryption Algorithm. Fast Software Encryption — FSE’94 Proceedings. Springer-Verlag LNCS. Vol. 1008 (1995) 86–96

    Google Scholar 

  4. Rivest, R.L., Robshaw, M.J.B., Sidney, R. and Yin, Y.L.: The RC6 Block Cipher. Proceedings of the 1st Advanced Encryption Standard Candidate Conference. Venture, California (Aug. 20–22, 1998) (http://www.nist.gov/aes)

  5. Burwick, C., Coppersmith, D., D’Avingnon, E., Gennaro, R., Halevi, Sh., Jutla, Ch., Matyas,Jr. S.M., O’Connor, L., Peyravian, M., Safford, D., and Zunic, N.: MARS — a Candidate Cipher for AES. Proceedings of 1st Advanced Encryption Standard Candidate Conference. Venture, California (Aug. 20–22, 1998)

    Google Scholar 

  6. Benes, V.E.: Mathematical Theory of Connecting Networks and Telephone Traffic, Academic Press, New York (1965)

    MATH  Google Scholar 

  7. Waksman, A.A.: Permutation Network. Journal of the ACM, Vol. 15.1 (1968) 159–163

    Article  Google Scholar 

  8. Portsa, M.: On the Use of Interconnection Networks in Cryptography. Advances in Cryptology-EUROCRYT’91 Proceedings. Springer Verlag LNCS, Vol. 547. (1991) 302–315

    Google Scholar 

  9. Goots, N.D., Moldovyan, A.A., Moldovyan, A.A.: Fast Encryptuion Algorithm SPECTRH64. International Workshop Mathematical Methods, Models and Architectures for Computer Network Security — MMM-2001 Proceedings. Springer Verlag LNCS. This vol. (2001)

    Google Scholar 

  10. Moldovyan, A.A., Moldovyan, N.A. and Moldovyanu, P.A.: A Method of the Block Cryptographical Transformation of the Binary Information. Russian patent 2141729. Bull. no 32 (1999)

    Google Scholar 

  11. Maslovsky, V.M., Moldovyan, A.A., and Moldovyan, N.A.: A Method of the Block Encryption of Discrete Data. Russian patent 2140710. Bull. no 30 (1999)

    Google Scholar 

  12. Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Design of the Controlled Two-place Operations for Fast Flexible Cryptosystems, Security of the Information Technologies, MIPhI, 4 (2000, in Russian)

    Google Scholar 

  13. Biham, E., and Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag (1993)

    Google Scholar 

  14. Nyberg, K.: Differentially Uniform Mappings for Cryptography. Advances in Cryptology-EUROCRYT’93 Proceedings. Springer Verlag LNCS. Vol. 765 (1994) 55–64

    Google Scholar 

  15. Matsui, M.: Linear Cryptoanalysis Method for DES Cipher. Advances in Cryptology — EUROCRYT’93 Proceedings. Springer Verlag LNCS. Vol. 765 (1994) 386–397

    Google Scholar 

  16. Nyberg, K.: Linear Approximations of Block Ciphers. Advances in Cryptology — EUROCRYT’94 Proceedings. Springer Verlag LNCS. Vol. 950 (1994) 139–144

    Google Scholar 

  17. Nyberg, K.: Constructions of Bent Functions and Difference Sets. Advances in Cryptology-EUROCRYT’90 Proceedings. Springer Verlag LNCS. Vol. 473 (1991) 151–160

    Google Scholar 

  18. Kurosawa, K., Satoh T.: Desigh of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria. Advances in Cryptology-EUROCRYT’97 Proceedings. Springer Verlag LNCS (1998) 434–449

    Google Scholar 

  19. Nyberg, K., Knudsen, L.: Provable Security Against a Differential Attack. Advances in Cryptology — CRYPTO’92 Proceedings. Springer Verlag LNCS. Vol. 740 (1994) 566–574

    Google Scholar 

  20. Lai, X., Massey, J.L.: Markov Ciphers and Differential Cryptanalysis. Advances in Cryptology-EUROCRYT’91 Proceedings. Springer Verlag LNCS. Vol. 547 (1992) 17–38

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A. (2001). Controlled Operations as a Cryptographic Primitive. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds) Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture Notes in Computer Science, vol 2052. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45116-1_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-45116-1_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42103-0

  • Online ISBN: 978-3-540-45116-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics