MY150357A - A method for linear transformation in substitution-permutation networks symmetric-key block cipher - Google Patents
A method for linear transformation in substitution-permutation networks symmetric-key block cipherInfo
- Publication number
- MY150357A MY150357A MYPI2010005206A MY150357A MY 150357 A MY150357 A MY 150357A MY PI2010005206 A MYPI2010005206 A MY PI2010005206A MY 150357 A MY150357 A MY 150357A
- Authority
- MY
- Malaysia
- Prior art keywords
- permutation
- matrix
- key
- deriving
- scalar
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Peptides Or Proteins (AREA)
- Complex Calculations (AREA)
Abstract
ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY- DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I.THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM BINARY INPUT; MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR, PRODUCING FIRST INTERMEDIATE MATRIX; DERIVING FIRST PERMUTATION OF N OBJECTS FROM BINARY INPUT; PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION, PRODUCING SECOND INTERMEDIATE MATRIX; DERIVING SECOND PERMUTATION OF N OBJECTS FROM BINARY INPUT; AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION TO PRODUCE FINAL MDS MATRIX.ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY-DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM THE KEY (202); MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR TO PRODUCE FIRST INTERMEDIATE MATRIX (204); DERIVING FIRST PERMUTATION OF N OBJECTS FROM THE KEY (206); PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION TO PRODUCE SECOND INTERMEDIATE MATRIX (208); DERIVING SECOND PERMUTATION OF N OBJECTS FROM THE KEY (304); AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION (212) TO PRODUCE FINAL MDS MATRIX (214).
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
PCT/MY2011/000105 WO2012060685A1 (en) | 2010-11-04 | 2011-06-17 | A method for linear transformation in substitution-permutation network symmetric-key block cipher |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
Publications (1)
Publication Number | Publication Date |
---|---|
MY150357A true MY150357A (en) | 2013-12-31 |
Family
ID=46024655
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY150357A (en) |
WO (1) | WO2012060685A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2484890A (en) | 2010-08-17 | 2012-05-02 | Artemis Intelligent Power Ltd | Ring cam ensuring smooth follower handover between segments |
JP5801822B2 (en) | 2010-08-17 | 2015-10-28 | アルテミス インテリジェント パワー リミティドArtemis Intelligent Power Limited | Fluid actuated machine with multilobing cam |
KR20220137024A (en) * | 2020-01-10 | 2022-10-11 | 제우 테크놀로지스, 인크. | Symmetric Asynchronous Generation Encryption Method |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
JP4561252B2 (en) * | 2004-09-03 | 2010-10-13 | ソニー株式会社 | Cryptographic processing apparatus, cryptographic processing method, and computer program |
US9336160B2 (en) * | 2008-10-30 | 2016-05-10 | Qualcomm Incorporated | Low latency block cipher |
-
2010
- 2010-11-04 MY MYPI2010005206 patent/MY150357A/en unknown
-
2011
- 2011-06-17 WO PCT/MY2011/000105 patent/WO2012060685A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2012060685A8 (en) | 2016-09-01 |
WO2012060685A1 (en) | 2012-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Daemen et al. | Rijndael. | |
Kazymyrov et al. | A method for generation of high-nonlinear s-boxes based on gradient descent | |
CA2632857A1 (en) | Closed galois field combination | |
Jovanovic et al. | An algebraic fault attack on the LED block cipher | |
Tezcan | Improbable differential attacks on Present using undisturbed bits | |
WO2008059420A3 (en) | Cryptographic method for a white-box implementation | |
WO2008084433A3 (en) | Tracing copies of an implementation | |
WO2006082984A3 (en) | Methods and apparatus for providing a message authentication code using a pipeline | |
Xiao et al. | Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption | |
MY150357A (en) | A method for linear transformation in substitution-permutation networks symmetric-key block cipher | |
WO2011136614A3 (en) | Encryption system using discrete chaos function | |
WO2008114829A1 (en) | Encryption device, decryption device, encryption program, decryption program, and recording medium | |
Van Le et al. | Complementation-like and cyclic properties of AES round functions | |
WO2015023368A3 (en) | Apparatus and method for key update for use in a block cipher algorithm | |
CN104601321A (en) | Key expansion method and device | |
CN103731257B (en) | A kind of Piccolo AES Hardware Implementation | |
WO2011105834A3 (en) | Method for generating codewords | |
CN104753662A (en) | Encryption key stream generating method based on AES (Advanced Encryption Standard) algorithm | |
WO2007112040A3 (en) | Method and system for generating electronic keys | |
Malik | A novel key-based transposition scheme for text encryption | |
Wenceslao Jr et al. | Modified AES algorithm using multiple S-boxes | |
WO2009034929A1 (en) | Ciphering method, ciphering device, and cipher processing program | |
Guo et al. | A pipelined implementation of the Grøstl hash algorithm and the advanced encryption standard | |
Sastry et al. | A Modified Feistel Cipher Involving Substitution, shifting of rows, mixing of columns, XOR operation with a Key and Shuffling | |
Medeleanu et al. | Considerations about the possibilities to improve AES S-box cryptographic properties by Multiplication |