MY150357A - A method for linear transformation in substitution-permutation networks symmetric-key block cipher - Google Patents
A method for linear transformation in substitution-permutation networks symmetric-key block cipherInfo
- Publication number
- MY150357A MY150357A MYPI2010005206A MY150357A MY 150357 A MY150357 A MY 150357A MY PI2010005206 A MYPI2010005206 A MY PI2010005206A MY 150357 A MY150357 A MY 150357A
- Authority
- MY
- Malaysia
- Prior art keywords
- permutation
- matrix
- key
- deriving
- scalar
- Prior art date
Links
- 230000009466 transformation Effects 0.000 title abstract 3
- 239000011159 matrix material Substances 0.000 abstract 16
- 230000001419 dependent effect Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Peptides Or Proteins (AREA)
- Complex Calculations (AREA)
Abstract
ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY- DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I.THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM BINARY INPUT; MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR, PRODUCING FIRST INTERMEDIATE MATRIX; DERIVING FIRST PERMUTATION OF N OBJECTS FROM BINARY INPUT; PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION, PRODUCING SECOND INTERMEDIATE MATRIX; DERIVING SECOND PERMUTATION OF N OBJECTS FROM BINARY INPUT; AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION TO PRODUCE FINAL MDS MATRIX.ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY-DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM THE KEY (202); MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR TO PRODUCE FIRST INTERMEDIATE MATRIX (204); DERIVING FIRST PERMUTATION OF N OBJECTS FROM THE KEY (206); PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION TO PRODUCE SECOND INTERMEDIATE MATRIX (208); DERIVING SECOND PERMUTATION OF N OBJECTS FROM THE KEY (304); AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION (212) TO PRODUCE FINAL MDS MATRIX (214).
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
| PCT/MY2011/000105 WO2012060685A1 (en) | 2010-11-04 | 2011-06-17 | A method for linear transformation in substitution-permutation network symmetric-key block cipher |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MY150357A true MY150357A (en) | 2013-12-31 |
Family
ID=46024655
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
Country Status (2)
| Country | Link |
|---|---|
| MY (1) | MY150357A (en) |
| WO (1) | WO2012060685A1 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2484890A (en) | 2010-08-17 | 2012-05-02 | Artemis Intelligent Power Ltd | Ring cam ensuring smooth follower handover between segments |
| AU2010359165B2 (en) | 2010-08-17 | 2014-06-05 | Artemis Intelligent Power Limited | Fluid-working machine with multi-lobe ring cam |
| JP2023509977A (en) * | 2020-01-10 | 2023-03-10 | ゼットイーユー・テクノロジーズ・インコーポレイテッド | Method for symmetric asynchronous generative encryption |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
| JP4561252B2 (en) * | 2004-09-03 | 2010-10-13 | ソニー株式会社 | Cryptographic processing apparatus, cryptographic processing method, and computer program |
| US9336160B2 (en) * | 2008-10-30 | 2016-05-10 | Qualcomm Incorporated | Low latency block cipher |
-
2010
- 2010-11-04 MY MYPI2010005206 patent/MY150357A/en unknown
-
2011
- 2011-06-17 WO PCT/MY2011/000105 patent/WO2012060685A1/en not_active Ceased
Also Published As
| Publication number | Publication date |
|---|---|
| WO2012060685A1 (en) | 2012-05-10 |
| WO2012060685A8 (en) | 2016-09-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Lambić | A novel method of S-box design based on chaotic map and composition method | |
| CA2632857A1 (en) | Closed galois field combination | |
| Kazymyrov et al. | A method for generation of high-nonlinear s-boxes based on gradient descent | |
| Liu et al. | An AES S-box to increase complexity and cryptographic analysis | |
| RU2009107223A (en) | ENCRYPTION PROCESSING DEVICE, ENCRYPTION PROCESSING METHOD AND COMPUTER PROGRAM | |
| WO2009020060A1 (en) | Common key block encryption device, common key block encryption method, and program | |
| WO2010105915A3 (en) | Method for providing a cryptic pair of keys | |
| Alkhaldi et al. | A novel design for the construction of safe S-boxes based on TDERC sequence | |
| GR20090100534A (en) | Matrix inversion using qr decoposition on a parallel pipelined systolic array | |
| MY150357A (en) | A method for linear transformation in substitution-permutation networks symmetric-key block cipher | |
| WO2011136614A3 (en) | Encryption system using discrete chaos function | |
| Jovanovic et al. | An algebraic fault attack on the LED block cipher | |
| WO2008114829A1 (en) | Encryption device, decryption device, encryption program, decryption program, and recording medium | |
| Xiao et al. | Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption | |
| Deng et al. | A novel combined cryptographic and hash algorithm based on chaotic control character | |
| CN104753662B (en) | Encryption key stream generation method based on aes algorithm | |
| Sakallı et al. | On the algebraic construction of cryptographically good 32× 32 binary linear transformations | |
| WO2011105834A3 (en) | Method for generating codewords | |
| RU2012144274A (en) | METHOD FOR DEPERSONALIZING PERSONAL DATA | |
| Wenceslao Jr et al. | Modified AES algorithm using multiple S-boxes | |
| WO2009034929A1 (en) | Ciphering method, ciphering device, and cipher processing program | |
| Medeleanu et al. | Considerations about the possibilities to improve AES S-box cryptographic properties by multiplication | |
| Malik | A novel key-based transposition scheme for text encryption | |
| Guo et al. | A pipelined implementation of the Grøstl hash algorithm and the advanced encryption standard | |
| CN108055126A (en) | The method of anti-power consumption attack based on random addition chain |