Information Technology Reference
In-Depth Information
This P 32 / 80 -box consists of five layers of 16 parallel elementary P 2 / 1 -boxes
with some fixed connection between layers. Design schemes of the boxes P 2 / 1 ,
P 4 / 4 and P 8 / 12 are shown in Fig. 2. P 2 / 1 -box is controlled by one bit v .If v =1,
it swaps two input bits, otherwise (if v = 0) does not.
v
P 2/1
P 2/1
P 2/1
P 2/1
P 2/1
P 2/1
P 2/1
P 2/1
P 4/4
P 4/4
P 2/1
1
0
(a )
(b )
(c )
Fig. 2. Structure of the boxes ( a ) P 2 / 1 ,( b ) P 4 / 4 and ( c ) P 8 / 12
2.2
Encryption Scheme
Encryption scheme is defined by the following formulas:
C = F ( P, K ), where P is the plaintext, C is the ciphertext, K is the secrete
key( P, C
64 ,K
256 ) and F is the encryption function.
∈{
0 , 1
}
∈{
0 , 1
}
. . .
x 63 x 64
x 1 x 2
x 3 x 4
x 1 x 2
x 3 x 4
. . .
x 63 x 64
v 32
v 1
v 2
v 1
v 2
v 32
P 2/1
P 2/1
P 2/1
P 2/1
P 2/1
P 2/1
. . .
. . .
y 63 y 64
y 1 y 2
y 3 y 4
y 1 y 2
y 3 y 4
y 63 y 64
(a)
x
y - inversion (y=x 1)
(b)
Fig. 3. (a) IT and (b) FT
Secret key K is extended into subkey streams by simple and repeated meth-
ods. The encryption algorithm F is designed as sequence of the following pro-
cedures: initial transformation IT , 12 round with procedure Crpyt and final
transformation FT . IT and FT are simple transformations performing based on
CP -box with control vectors. Fig. 4.(a) shows the general encryption scheme.
IT and FT are constructed with 32 P 2 / 1 boxes. The left half and right half of
output of IT are the arrangement of those of input of IT xored with 0 x 55555555,
respectively. FT is the inverse of the procedure IT . Fig. 3 depicts the IT and
FT .
Search WWH ::




Custom Search