Abstract
In large information systems different data transform algorithms including the bit permutation operations requiring an execution of great number of cycles are used. To increase significantly the software performance of such algorithm a controlled bit permutation instruction (BPI) is desirable. Here a question of justification of embedding a new command, controlled BPI, into the standard set of instructions of general-purpose processor for increasing the efficiency of different types algorithms implemented in software is studied. In a variety of applications two different types of bit permutation operations are required: arbitrary fixed permutations and variable permutations. The last are used in a new fast cipher designs based on data-dependent permutations. Accounting for an expediency of embedding the controlled permutation command into the set of elementary processor operations the cryptographic applications form only one of the motivation elements. Another strong motivation is BPI’s use for solving variety of non-cryptographic problems. The multipurpose architecture of the BPI operation oriented to the efficient execution of both the cryptographic functions based on data-driven permutations and the algorithms including arbitrary bit permutations is proposed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R.B. Lee, Z.J. Shi, X. Yang, Efficient permutation instructions for Fast Software Cryptography. IEEE Micro. 2001, vol. 21, no 6, pp. 56–69.
R.B. Lee, Z.J. Shi, R.L. Rivesr, M.J.B. Robshaw, On permutation operations in Cipher Design. Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04), Las Vegas, Nevada, April 5–7, 2004, vol. 2, p. 569–579.
N.A. Moldovyan, A.A. Moldovyan. Innovative cryptography.-Charles River Media, Boston, Massachusetts, 2006.-386 pp.
N.A. Moldovyan, P.A. Moldovyanu, D.H. Summerville. On Software Implementation of Fast DDP-Based Ciphers. International Journal of Network Security. 2007. vol. 4, no. 1. P.81–89 (http://isrc.nchu.edu.tw/ijns/)
N.A. Moldovyan, A.A. Moldovyan, Sklavos N. Controlled Elements for Designing Ciphers Suitable to Efficient VLSI Implementation. // Telecommunication Systems. 2006. vol. 32, no 2/3. P. 149–163.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Moldovyan, A.A., Moldovyan, N.A., Moldovyanu, P.A. (2007). Architecture Types of the Bit Permutation Instruction for General Purpose Processors. In: Popovich, V.V., Schrenk, M., Korolenko, K.V. (eds) Information Fusion and Geographic Information Systems. Lecture Notes in Geoinformation and Cartography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-37629-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-540-37629-3_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37628-6
Online ISBN: 978-3-540-37629-3
eBook Packages: Earth and Environmental ScienceEarth and Environmental Science (R0)