Information Technology Reference
In-Depth Information
a)
B
c)
A
b)
B
A
A
B
32
32
Crypt (e)
+ 32
G r
T r
G r
T r
Crypt (e)
32
>>>8
A'
96
( A ' , e 1 )
E
S 32;96
A'
( A ' , e' )
Crypt (e)
E
S 32;96
96
B'
( B' , e 2 )
E
S 32;96
Fi na l
transformation
>>>8
96
e 1,2 = e 1,2 ( e , r )
e' = e' ( e , r )
Fig. 6. Firmware-suitable ciphers: a SCO-2, b SCO-3, c outline of encryption
Ta b l e 3 . SCO-2 and SCO-3: Specification of the switching bits and round subkeys
e = 1
e = 1 ∗∗
Round
e = 0
e = 0
e = 1
e
e
r
G r
T r
G r
T r
G r
T r
e 1
e 2
e 1
e 2
1
Q 1
Q 2
Q 2
Q 3
Q 2
Q 3
1
0
1
0
1
1
2
Q 3
Q 4
Q 4
Q 1
Q 1
Q 4
0
0
0
1
0
0
3
Q 3
Q 2
Q 2
Q 3
Q 3
Q 2
1
1
1
0
0
0
4
Q 4
Q 1
Q 1
Q 4
Q 4
Q 1
0
1
0
1
0
0
5
Q 4
Q 3
Q 1
Q 3
Q 3
Q 1
1
0
1
1
1
1
6
Q 1
Q 2
Q 2
Q 4
Q 4
Q 2
1
1
1
0
1
1
7
Q 4
Q 3
Q 3
Q 4
Q 4
Q 3
0
1
0
0
0
0
8
Q 4
Q 2
Q 2
Q 1
Q 1
Q 2
0
0
0
1
0
0
9
Q 3
Q 1
Q 3
Q 4
Q 4
Q 3
1
0
1
0
1
1
10
Q 4
Q 1
Q 1
Q 4
Q 4
Q 1
1
1
1
0
0
0
11
Q 3
Q 2
Q 2
Q 3
Q 3
Q 2
1
0
1
1
1
1
12
Q 1
Q 4
Q 4
Q 3
Q 3
Q 4
0
1
0
1
0
0
FT
Q 2
Q 3
Q 1
Q 2
Q 1
Q 2
-
-
-
-
-
-
=(
,
,
,
)
SCO-3 (b) working with the 128-bit key Q
. The generalized en-
cryption scheme of the both ciphers is represented in Fig. 6(c). The FT in SCO-2 is
performed as swapping subblocks and performing two XOR operations: A :
Q 1
Q 2
Q 3
Q 4
=
A
G 13
and B :
=
B
T 13 . In SCO-3 the FT is performed as follows: A :
=
A
32 G 13 and B :
=
n ”) denote addition (subtraction) modulo 2 n .Table3presents
the key scheduling and specification of the switching bits for SCO-2 and SCO-3. The
ciphers use identical key scheduling for encryption, however for decryption SCO-2 and
SCO-3 use different key scheduling. Key scheduling marked with token
B
+ 32 T 13 ,where“
+ n ”(“
( ∗∗ ) corre-
sponds to SCO-3 (SCO-2).
Search WWH ::




Custom Search