Information Technology Reference
In-Depth Information
than the linear attack. This result is in confirmation with the analysis of other DDO-
based ciphers described in [3]. The main results of this paper can be formulated as
follows:
1. The SCOs are introduced as a new cryptographic primitive suitable to designing
fast ciphers while implemented in cheap hardware.
2. The use of SCOs is a method to prevent weak keys and homogeneity in the ciphers
with SKS. Several SCO-based ciphers with SKS have been proposed.
3. Use of SCOs allows one to design secure ciphers that are free of reversing the
key scheduling while changing encryption mode for decryption one.
References
1. Biryukov, A., Wagner, D.: Advanced Slide Attacks. Advances in Cryptology - Euro-
crypt'2000, Lecture Notes in Computer Science, Vol. 1807, Springer-Verlag, Berlin (2000)
589-606
2. Eremeev, M.A., Moldovyan, A.A., Moldovyan, N.A.: Data Encryption Transformations
Based on New Primitive. Avtomatika i Telemehanika (Russian Academy of Sciences) 12
(2002) 35-47
3. Goots, N.D., Izotov, B.V., Moldovyan, A.A., Moldovyan, N.A.: Modern Cryptography: Pro-
tect Your Data with Fast Block Ciphers. Wayne, A-LIST Publishing (2003) 400
4. Goots, N.D., Moldovyan, A.A., Moldovyan, N.A.: Fast Encryption Algorithm SPECTR-
H64. Int. Workshop MMM-ANCS Proc. Lecture Notes in Computer Science, Vol. 2052,
Springer-Verlag, Berlin (2001) 275-286
5. Ichikawa, T., Kasuya, T., Matsui, M.: Hardware Evaluation of the AES Finalists, 3rd AES
Confer. Proc. April 13-14, 2000. New York, NY, USA (http://www.nist.gov/aes)
6. Moldovyan, A.A., Moldovyan, N.A.: A Cipher Based on Data-Dependent Permutations,
Journal of Cryptology, Vol. 15, 1 (2002) 61-72
7. Waksman, A.A.: Permutation Network. Journal of the ACM, Vol. 15, 1 (1968) 159-163
Search WWH ::




Custom Search