AU2001277548A1 - Linear transformation for symmetric-key ciphers - Google Patents

Linear transformation for symmetric-key ciphers

Info

Publication number
AU2001277548A1
AU2001277548A1 AU2001277548A AU7754801A AU2001277548A1 AU 2001277548 A1 AU2001277548 A1 AU 2001277548A1 AU 2001277548 A AU2001277548 A AU 2001277548A AU 7754801 A AU7754801 A AU 7754801A AU 2001277548 A1 AU2001277548 A1 AU 2001277548A1
Authority
AU
Australia
Prior art keywords
sub
matrix
linear transformation
sup
symmetric
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001277548A
Inventor
Petrus L. A. Roelse
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koninklijke Philips NV
Original Assignee
Koninklijke Philips Electronics NV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koninklijke Philips Electronics NV filed Critical Koninklijke Philips Electronics NV
Publication of AU2001277548A1 publication Critical patent/AU2001277548A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction

Abstract

A method of generating a linear transformation matrix A for use in a symmetric-key cipher includes generating a binary [n,k,d] error-correcting code, where k<n<2k, and d is the minimum distance of the binary error-correcting code. The code is represented by a generator matrix GepsilonZ<SUB>2</SUB><SUP>kxn </SUP>in a standard form G=(I<SUB>k</SUB>∥B), with BepsilonZ<SUB>2</SUB><SUP>kx(n-k)</SUP>. The matrix B is extended with 2k-n columns such that a resulting matrix C is non-singular. The linear transformation matrix A is derived from matrix C. Preferably, the error correcting code is based on an XBCH code.
AU2001277548A 2000-08-03 2001-07-20 Linear transformation for symmetric-key ciphers Abandoned AU2001277548A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
EP00202753.0 2000-08-03
EP00202753 2000-08-03
PCT/EP2001/008470 WO2002013452A2 (en) 2000-08-03 2001-07-20 Linear transformation for symmetric-key ciphers

Publications (1)

Publication Number Publication Date
AU2001277548A1 true AU2001277548A1 (en) 2002-02-18

Family

ID=8171882

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001277548A Abandoned AU2001277548A1 (en) 2000-08-03 2001-07-20 Linear transformation for symmetric-key ciphers

Country Status (10)

Country Link
US (1) US7450720B2 (en)
EP (1) EP1307993B1 (en)
JP (1) JP5079204B2 (en)
KR (1) KR100855890B1 (en)
CN (1) CN100431293C (en)
AT (1) ATE298952T1 (en)
AU (1) AU2001277548A1 (en)
DE (1) DE60111746T2 (en)
ES (1) ES2244639T3 (en)
WO (1) WO2002013452A2 (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1303941B1 (en) * 2000-07-04 2012-12-19 Koninklijke Philips Electronics N.V. Substitution-box for symmetric-key ciphers
JP2003302899A (en) * 2002-04-11 2003-10-24 Sony Corp Method and apparatus for encryption and decryption messages based on boolean matrix
US7840803B2 (en) 2002-04-16 2010-11-23 Massachusetts Institute Of Technology Authentication of integrated circuits
EP1387519A3 (en) * 2002-07-09 2004-02-18 Cp8 Method for protecting an electronic circuit against fault-based attacks
US20040078587A1 (en) * 2002-10-22 2004-04-22 Cameron Brackett Method, system, computer product and encoding format for creating anonymity in collecting patient data
EP1480371A1 (en) * 2003-05-23 2004-11-24 Mediacrypt AG Device and method for encrypting and decrypting a block of data
US7289629B2 (en) * 2004-02-09 2007-10-30 Microsoft Corporation Primitives for fast secure hash functions and stream ciphers
KR20050087271A (en) * 2004-02-26 2005-08-31 삼성전자주식회사 Key schedule apparatus for generating an encryption round key and a decryption round key selectively corresponding to initial round key having variable key length
EP1842203A4 (en) 2004-11-12 2011-03-23 Verayo Inc Volatile device keys and applications thereof
CN101091348B (en) 2004-12-28 2011-09-07 皇家飞利浦电子股份有限公司 Key generation using biometric data and secret extraction codes
US7702099B2 (en) * 2005-06-30 2010-04-20 Chiou-Haun Lee Multipoint synchronous diffused encryption/decryption method
ATE504884T1 (en) 2006-01-24 2011-04-15 Verayo Inc SIGNAL GENERATOR BASED DEVICE SAFETY
JP4882598B2 (en) * 2006-07-28 2012-02-22 ソニー株式会社 Cryptographic processing apparatus, cryptographic processing algorithm construction method, cryptographic processing method, and computer program
DE102006039327B4 (en) * 2006-08-22 2008-06-26 Nokia Siemens Networks Gmbh & Co.Kg Procedure for authentication
JP4967544B2 (en) * 2006-09-01 2012-07-04 ソニー株式会社 Cryptographic processing apparatus, cryptographic processing method, and computer program
US8559625B2 (en) * 2007-08-07 2013-10-15 Inside Secure Elliptic curve point transformations
WO2009079050A2 (en) 2007-09-19 2009-06-25 Verayo, Inc. Authentication with physical unclonable functions
US9548758B2 (en) * 2010-01-05 2017-01-17 Alcatel-Lucent Usa Inc. Secure compressive sampling using codebook of sampling matrices
US8712156B2 (en) * 2010-01-10 2014-04-29 Bronstein Bronstein Kimmel Technologies Ltd. Comparison of visual information
CN104396181B (en) * 2012-02-09 2018-02-23 爱迪德技术有限公司 system and method for generating and protecting cryptographic key
EP2885875A1 (en) * 2013-02-27 2015-06-24 Morpho Method for encoding data on a chip card by means of constant-weight codes
EP2885892A1 (en) * 2013-03-27 2015-06-24 Irdeto B.V. Aes implementation with error correction
EP3475825B1 (en) * 2016-06-23 2023-01-25 Cryptography Research, Inc. Cryptographic operations employing non-linear share encoding for protecting from external monitoring attacks
US10404667B2 (en) 2016-11-17 2019-09-03 Bank Of America Corporation Secure, autonomous file encryption and decryption
CN111786680B (en) * 2019-04-03 2023-01-13 华为技术有限公司 Method and device for determining generator matrix
CN111431697B (en) * 2020-03-31 2022-06-21 衡阳师范学院 Novel method for realizing lightweight block cipher CORL
US11610004B2 (en) * 2021-04-14 2023-03-21 Bank Of America Corporation System for implementing enhanced file encryption technique

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2725610B2 (en) * 1994-09-27 1998-03-11 日本電気株式会社 Secret key encryption method and apparatus
US5991414A (en) * 1997-09-12 1999-11-23 International Business Machines Corporation Method and apparatus for the secure distributed storage and retrieval of information
JP3017726B2 (en) * 1998-01-27 2000-03-13 日本電信電話株式会社 Data converter
US6363485B1 (en) * 1998-09-09 2002-03-26 Entrust Technologies Limited Multi-factor biometric authenticating device and method
EP1065593A1 (en) * 1999-07-02 2001-01-03 Institut Eurecom G.I.E. Process for securing the execution of a mobile code in an untrusted environment
US6947558B1 (en) * 1999-08-29 2005-09-20 Intel Corporation Stream cipher having a shuffle network combiner function

Also Published As

Publication number Publication date
JP2004506246A (en) 2004-02-26
US7450720B2 (en) 2008-11-11
EP1307993B1 (en) 2005-06-29
DE60111746T2 (en) 2006-05-18
ATE298952T1 (en) 2005-07-15
JP5079204B2 (en) 2012-11-21
KR20020041815A (en) 2002-06-03
US20020101986A1 (en) 2002-08-01
CN1398467A (en) 2003-02-19
EP1307993A2 (en) 2003-05-07
ES2244639T3 (en) 2005-12-16
KR100855890B1 (en) 2008-09-03
WO2002013452A3 (en) 2002-07-25
DE60111746D1 (en) 2005-08-04
WO2002013452A2 (en) 2002-02-14
CN100431293C (en) 2008-11-05

Similar Documents

Publication Publication Date Title
AU2001277548A1 (en) Linear transformation for symmetric-key ciphers
CA2345237A1 (en) Information additive code generator and decoder for communication systems
CA2341744A1 (en) Rate matching device and method for a data communication system
WO2002087305A3 (en) Method and apparatus for adjusting a dialing sequence based on location
WO2006045114A3 (en) Cryptographic primitives, error coding, and pseudo-random number improvement methods using quasigroups
IL147346A0 (en) Apparatus and method for encoding/decoding transport format combination indicator in cdma mobile communication system
AU2003214189A8 (en) Hierarchical identity-based encryption and signature schemes
CA2182428A1 (en) Method and Apparatus for Generating DC-Free Sequences
EP1137191A3 (en) Coding and decoding
GB2373696A (en) A configurable code generator system for spread spectrum applications
AU2001244911A1 (en) Method and system for storing a coding pattern
EP1555777A3 (en) A technique for producing a parameter, such as a checksum, through a primitive that uses elementary register operations
EP1137006A3 (en) Recording and/or reproducing data
KR100408037B1 (en) Bit level encoding/decoding method and apparatus
CA2273632A1 (en) Digital signature method
WO2002084943A3 (en) Pipelined deciphering round keys generation
EP1075088A3 (en) Encoding apparatus, encoding method, and providing medium
Hellman On using natural redundancy for error detection
DK0399587T3 (en) Method of encoding messages, each consisting of a row of at least one symbol
WO2003024000A3 (en) Encoder and method for efficient synchronisation channel encoding in utra tdd mode
Gadkari et al. Transmission energy allocation with low peak-to-average ratio
CA2263056A1 (en) Method and apparatus for finite field basis conversion
KASAGI et al. 6a-H-8 Anomalous proton and α-particle emission observed in the TiD_x+ d reaction at E_d= 150 keV
CA2475863A1 (en) Rate matching device and method for a data communication system
James et al. REDUCING ERROR RATES IN IMAGE TRANSMISSION OVER 3G SYSTEM USING CONVOLUTIONAL CODE TECHNIQUES IN WIRELESS COMMUNICATION NETWORKS