MY150357A - A method for linear transformation in substitution-permutation networks symmetric-key block cipher - Google Patents

A method for linear transformation in substitution-permutation networks symmetric-key block cipher

Info

Publication number
MY150357A
MY150357A MYPI2010005206A MY150357A MY 150357 A MY150357 A MY 150357A MY PI2010005206 A MYPI2010005206 A MY PI2010005206A MY 150357 A MY150357 A MY 150357A
Authority
MY
Malaysia
Prior art keywords
permutation
matrix
key
deriving
scalar
Prior art date
Application number
Inventor
Mohamed Ridza Wahiddin
Abdurashid Mamadolimov
Moesfa Soeheila Mohamad
Ramlan Mahod
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2010005206 priority Critical patent/MY150357A/en
Priority to PCT/MY2011/000105 priority patent/WO2012060685A1/en
Publication of MY150357A publication Critical patent/MY150357A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Peptides Or Proteins (AREA)
  • Complex Calculations (AREA)

Abstract

ONE EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY- DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I.THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM BINARY INPUT; MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR, PRODUCING FIRST INTERMEDIATE MATRIX; DERIVING FIRST PERMUTATION OF N OBJECTS FROM BINARY INPUT; PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION, PRODUCING SECOND INTERMEDIATE MATRIX; DERIVING SECOND PERMUTATION OF N OBJECTS FROM BINARY INPUT; AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION TO PRODUCE FINAL MDS MATRIX.ANOTHER EMBODIMENT OF THE PRESENT INVENTION IS A METHOD OF LINEAR TRANSFORMATION IN SUBSTITUTION-PERMUTATION NETWORK SYMMETRIC-KEY BLOCK CIPHER PRODUCING N X N KEY-DEPENDENT MDS MATRICES FROM GIVEN N X N MDS MATRIX BY SCALAR MULTIPLICATION AND PERMUTATIONS OF ELEMENTS OF GIVEN MATRIX WHERE MULTIPLICATIVE SCALAR AND PERMUTATIONS ARE DERIVED FROM BINARY INPUTS OF LENGTH I THE METHOD COMPRISING DERIVING MULTIPLICATIVE SCALAR FROM THE KEY (202); MULTIPLYING GIVEN MATRIX WITH MULTIPLICATIVE SCALAR TO PRODUCE FIRST INTERMEDIATE MATRIX (204); DERIVING FIRST PERMUTATION OF N OBJECTS FROM THE KEY (206); PERMUTING ROWS OF FIRST INTERMEDIATE MATRIX ACCORDING TO FIRST PERMUTATION TO PRODUCE SECOND INTERMEDIATE MATRIX (208); DERIVING SECOND PERMUTATION OF N OBJECTS FROM THE KEY (304); AND PERMUTING COLUMNS OF SECOND INTERMEDIATE MATRIX ACCORDING TO SECOND PERMUTATION (212) TO PRODUCE FINAL MDS MATRIX (214).
MYPI2010005206 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher MY150357A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2010005206 MY150357A (en) 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher
PCT/MY2011/000105 WO2012060685A1 (en) 2010-11-04 2011-06-17 A method for linear transformation in substitution-permutation network symmetric-key block cipher

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2010005206 MY150357A (en) 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher

Publications (1)

Publication Number Publication Date
MY150357A true MY150357A (en) 2013-12-31

Family

ID=46024655

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2010005206 MY150357A (en) 2010-11-04 2010-11-04 A method for linear transformation in substitution-permutation networks symmetric-key block cipher

Country Status (2)

Country Link
MY (1) MY150357A (en)
WO (1) WO2012060685A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2484890A (en) 2010-08-17 2012-05-02 Artemis Intelligent Power Ltd Ring cam ensuring smooth follower handover between segments
JP5801822B2 (en) 2010-08-17 2015-10-28 アルテミス インテリジェント パワー リミティドArtemis Intelligent Power Limited Fluid actuated machine with multilobing cam
KR20220137024A (en) * 2020-01-10 2022-10-11 제우 테크놀로지스, 인크. Symmetric Asynchronous Generation Encryption Method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327911A1 (en) * 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
JP4561252B2 (en) * 2004-09-03 2010-10-13 ソニー株式会社 Cryptographic processing apparatus, cryptographic processing method, and computer program
US9336160B2 (en) * 2008-10-30 2016-05-10 Qualcomm Incorporated Low latency block cipher

Also Published As

Publication number Publication date
WO2012060685A8 (en) 2016-09-01
WO2012060685A1 (en) 2012-05-10

Similar Documents

Publication Publication Date Title
Daemen et al. Rijndael.
Kazymyrov et al. A method for generation of high-nonlinear s-boxes based on gradient descent
CA2632857A1 (en) Closed galois field combination
Jovanovic et al. An algebraic fault attack on the LED block cipher
Tezcan Improbable differential attacks on Present using undisturbed bits
WO2008059420A3 (en) Cryptographic method for a white-box implementation
WO2008084433A3 (en) Tracing copies of an implementation
WO2006082984A3 (en) Methods and apparatus for providing a message authentication code using a pipeline
Xiao et al. Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption
MY150357A (en) A method for linear transformation in substitution-permutation networks symmetric-key block cipher
WO2011136614A3 (en) Encryption system using discrete chaos function
WO2008114829A1 (en) Encryption device, decryption device, encryption program, decryption program, and recording medium
Van Le et al. Complementation-like and cyclic properties of AES round functions
WO2015023368A3 (en) Apparatus and method for key update for use in a block cipher algorithm
CN104601321A (en) Key expansion method and device
CN103731257B (en) A kind of Piccolo AES Hardware Implementation
WO2011105834A3 (en) Method for generating codewords
CN104753662A (en) Encryption key stream generating method based on AES (Advanced Encryption Standard) algorithm
WO2007112040A3 (en) Method and system for generating electronic keys
Malik A novel key-based transposition scheme for text encryption
Wenceslao Jr et al. Modified AES algorithm using multiple S-boxes
WO2009034929A1 (en) Ciphering method, ciphering device, and cipher processing program
Guo et al. A pipelined implementation of the Grøstl hash algorithm and the advanced encryption standard
Sastry et al. A Modified Feistel Cipher Involving Substitution, shifting of rows, mixing of columns, XOR operation with a Key and Shuffling
Medeleanu et al. Considerations about the possibilities to improve AES S-box cryptographic properties by Multiplication