MY150357A - A method for linear transformation in substitution-permutation networks symmetric-key block cipher - Google Patents

A method for linear transformation in substitution-permutation networks symmetric-key block cipher

Info

Publication number
MY150357A
MY150357A MYPI2010005206A MY150357A MY 150357 A MY150357 A MY 150357A MY PI2010005206 A MYPI2010005206 A MY PI2010005206A MY 150357 A MY150357 A MY 150357A
Authority
MY
Malaysia
Prior art keywords
permutation
matrix
key
deriving
scalar
Prior art date
Application number
Inventor
Mohamed Ridza Wahiddin
Abdurashid Mamadolimov
Moesfa Soeheila Mohamad
Ramlan Mahod
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2010005206 priority Critical patent/MY150357A/en
Priority to PCT/MY2011/000105 priority patent/WO2012060685A1/en
Publication of MY150357A publication Critical patent/MY150357A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Peptides Or Proteins (AREA)
  • Complex Calculations (AREA)

Abstract

ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY- DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I.THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM BINARY INPUT; MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR, PRODUCING FIRST INTERMEDIATE MATRIX; DERIVING FIRST PERMUTATION OF N OBJECTS FROM BINARY INPUT; PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION, PRODUCING SECOND INTERMEDIATE MATRIX; DERIVING SECOND PERMUTATION OF N OBJECTS FROM BINARY INPUT; AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION TO PRODUCE FINAL MDS MATRIX.ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY-DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM THE KEY (202); MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR TO PRODUCE FIRST INTERMEDIATE MATRIX (204); DERIVING FIRST PERMUTATION OF N OBJECTS FROM THE KEY (206); PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION TO PRODUCE SECOND INTERMEDIATE MATRIX (208); DERIVING SECOND PERMUTATION OF N OBJECTS FROM THE KEY (304); AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION (212) TO PRODUCE FINAL MDS MATRIX (214).
MYPI2010005206 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher MY150357A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2010005206 MY150357A (en) 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher
PCT/MY2011/000105 WO2012060685A1 (en) 2010-11-04 2011-06-17 A method for linear transformation in substitution-permutation network symmetric-key block cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2010005206 MY150357A (en) 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher

Publications (1)

Publication Number Publication Date
MY150357A true MY150357A (en) 2013-12-31

Family

ID=46024655

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2010005206 MY150357A (en) 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher

Country Status (2)

Country Link
MY (1) MY150357A (en)
WO (1) WO2012060685A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2484890A (en) 2010-08-17 2012-05-02 Artemis Intelligent Power Ltd Ring cam ensuring smooth follower handover between segments
AU2010359165B2 (en) 2010-08-17 2014-06-05 Artemis Intelligent Power Limited Fluid-working machine with multi-lobe ring cam
JP2023509977A (en) * 2020-01-10 2023-03-10 ゼットイーユー・テクノロジーズ・インコーポレイテッド Method for symmetric asynchronous generative encryption

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327911A1 (en) * 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
JP4561252B2 (en) * 2004-09-03 2010-10-13 ソニー株式会社 Cryptographic processing apparatus, cryptographic processing method, and computer program
US9336160B2 (en) * 2008-10-30 2016-05-10 Qualcomm Incorporated Low latency block cipher

Also Published As

Publication number Publication date
WO2012060685A1 (en) 2012-05-10
WO2012060685A8 (en) 2016-09-01

Similar Documents

Publication Publication Date Title
Lambić A novel method of S-box design based on chaotic map and composition method
CA2632857A1 (en) Closed galois field combination
Kazymyrov et al. A method for generation of high-nonlinear s-boxes based on gradient descent
Liu et al. An AES S-box to increase complexity and cryptographic analysis
RU2009107223A (en) ENCRYPTION PROCESSING DEVICE, ENCRYPTION PROCESSING METHOD AND COMPUTER PROGRAM
WO2009020060A1 (en) Common key block encryption device, common key block encryption method, and program
WO2010105915A3 (en) Method for providing a cryptic pair of keys
Alkhaldi et al. A novel design for the construction of safe S-boxes based on TDERC sequence
GR20090100534A (en) Matrix inversion using qr decoposition on a parallel pipelined systolic array
MY150357A (en) A method for linear transformation in substitution-permutation networks symmetric-key block cipher
WO2011136614A3 (en) Encryption system using discrete chaos function
Jovanovic et al. An algebraic fault attack on the LED block cipher
WO2008114829A1 (en) Encryption device, decryption device, encryption program, decryption program, and recording medium
Xiao et al. Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption
Deng et al. A novel combined cryptographic and hash algorithm based on chaotic control character
CN104753662B (en) Encryption key stream generation method based on aes algorithm
Sakallı et al. On the algebraic construction of cryptographically good 32× 32 binary linear transformations
WO2011105834A3 (en) Method for generating codewords
RU2012144274A (en) METHOD FOR DEPERSONALIZING PERSONAL DATA
Wenceslao Jr et al. Modified AES algorithm using multiple S-boxes
WO2009034929A1 (en) Ciphering method, ciphering device, and cipher processing program
Medeleanu et al. Considerations about the possibilities to improve AES S-box cryptographic properties by multiplication
Malik A novel key-based transposition scheme for text encryption
Guo et al. A pipelined implementation of the Grøstl hash algorithm and the advanced encryption standard
CN108055126A (en) The method of anti-power consumption attack based on random addition chain