WO1999020018A1 - Novel digital cryptography method by selector box - Google Patents
Novel digital cryptography method by selector box Download PDFInfo
- Publication number
- WO1999020018A1 WO1999020018A1 PCT/FR1998/002169 FR9802169W WO9920018A1 WO 1999020018 A1 WO1999020018 A1 WO 1999020018A1 FR 9802169 W FR9802169 W FR 9802169W WO 9920018 A1 WO9920018 A1 WO 9920018A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- function
- mixing box
- cryptography method
- bits
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/12—Details relating to cryptographic hardware or logic circuitry
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Definitions
- the present invention relates to a method of cryptography of data recorded in the form of bits on a medium usable by a calculation unit able to process input data m, to provide output data m ', comprising at least one processing step.
- the calculation unit uses a function C_ (m) dependent on a key k.
- Encryption and decryption constitute cryptography.
- the fundamental principles of cryptography were defined by Shannon in 1949.
- They are mainly based on the use of a calculation unit which processes functions and data by means of electronic circuits.
- DES Data Encryption Standard
- the DES function was perfectly suited to the security needs and technology of the time, but it is now insufficient, as shown in the last Challenge RSA attack competition.
- AES Advanced Encryption Standard
- the object of the invention is a method of data cryptography which ensures high security, which can be carried out with relatively simple functions requiring limited means of calculation and which ensures optimum performance with current technology, using as little as possible. of electronic circuits, for the sake of economy.
- the invention relates to a cryptography method as defined above, characterized in that the function C k (m) dependent on a key k, comprises a mixing box M able to process mixing box input data (x 1 ⁇ ..., ⁇ x i ( ..., x r ), r ⁇ 2, where x ,, ..., x s are bit blocks, to provide mixing box output data, (y_, ... y j , ... y s ), s ⁇ 2, where y 1? ..., y s , are bit blocks, mixing box which, when all but one of the mixing box input data is fixed, produces for each mixing box output data a value which is obtained by permuting the value of the data non-fixed mixing box inlet.
- the calculation unit is composed of one or more calculation boxes, in a network, a calculation box being a set capable of performing a calculation, for example a set of electronic circuits.
- the mixing box M is a permutation, and preferably, the mixing box M is a multipermutation.
- the mixing box M is obtained by adding to a mixing box a permutation on at least any one of its input data or its output data.
- the function CJ n) is obtained by the implementation of successive stages of data processing, each stage verifying the property of the mixing box output data.
- the mixing box comprises a step of processing data by an invertible linear function ⁇ (x).
- the cryptography method comprises a step of processing data by a permutation P with 8 input bits and 8 output bits, such as:
- the cryptography method comprises a step of processing data by a permutation g with 4 input bits and 4 output bits, such as:
- the key k is broken down into at least two blocks k -1 and k -2 , and according to another improvement, the blocks k -1 and k "2 are treated by means of a Feistel diagram to produce sub-keys ko, ..., k nieth.
- FIG. 1 represents an overall view of the encryption
- FIG. 2 represents each function F of FIG. 1
- FIG. 3 represents the function g in which the letter "n" is an electronic NAND function
- FIG. 4 represents each permutation P of FIG. 2,
- FIG. 5 represents the transformation E of FIG. 1 preceded by a series of transformations using the exclusive OR function
- FIG. 6 represents the functions M and M -1 of FIG. 5,
- FIG. 7 schematically shows the decryption operations, that is to say the reverse operations such as those described in the previous figures.
- the cryptography method processes the data recorded m by blocks of fixed length equal to eight bytes.
- the function C_ is carried out by means of a calculation unit consisting of a calculation box which uses a mixing box M (x, y) with two inputs.
- a mixing box M (x ,, ..., x r ) ar inputs (r ⁇ 2) is a function that transforms r inputs into s outputs, so that each output has a uniform distribution by permutation if one arbitrarily fixes (r - 1) entries and that the remaining entry is random.
- each step consists in carrying out an exclusive bit-by-bit or exclusive with a subkey k "calculated from k and which depends on the number of step i, then in performing a transformation E.
- the final step is one or bit-by-bit exclusive with a last subkey k 8, so we have
- the step keys all eight bytes, are obtained from k by a key diversification process based on the Feisiel scheme.
- the key ⁇ - is originally a series of bytes of variable length (at most sixteen) which are completed over sixteen bytes with null bytes. These sixteen bytes are divided into two sequences of eight bytes / c ⁇ 2 and k "1 which initialize the sequence k ⁇ 2 , / o _1 , k °, / e 1 , ..., k s . Two consecutive elements k ' and / c î + 1 of this sequence determine a new element k l + 2 by the formula of recurrence
- FIG. 1 illustrates the overview of the encryption process.
- the function E c . + 2 first performs an exclusive bit-by-bit of the input with the constant c l + 2 , then applies a transformation P on each of the eight bytes obtained, and finally a transformation T (see Figure 2). If we consider the eight bytes coming out of the P transformations as an array of eight lines of eight bits, the transformation T only swaps the lines and the columns.
- the transformation P is described by a Feistel scheme.
- the entry is a byte split into two four-bit numbers. Each number enters one of the branches of the Feistel scheme described in Figure 4.
- the / function is defined by the hexadecimal table
- the function g is defined by the table
- Each stage consists of one or exclusive, with a step key, or a constant c or c ', of four boxes of mixture M, and of byte position exchanges.
- Each box M transforms two bytes x g and X d into two bytes y g and y ⁇ by the formula
- R is the circular rotation defined by
- ⁇ (x 7 ,..., x 0 ) ⁇ x7, X ⁇ ⁇ X5, Z5, z 4 ⁇ £ 3, ⁇ 3, 22 ⁇ rc ⁇ , ⁇ , a ; o ⁇ -c 7 ).
- the M function is constructed to satisfy the mixing box property.
- One construction criterion was to make it easy to achieve with current technology. It is also such that the inverse function ⁇ ! is also easy to do.
- the functions M and M ⁇ l can be performed by the circuits shown in Figure 6 (we have included the exclusive or with the constant (C S ,) in this figure).
- the function ⁇ ' is defined by
- ⁇ ' ⁇ . r 7 ,. . . , x Q ) (x ⁇ x 6 , x ⁇ s s ⁇ £, .r, . ⁇ 3 ⁇ x 2 , x 2 , .r x ⁇ x 0 , x 0 ).
- the byte position exchange of each stage is based on the fast Fourier transform graph, used in the P ⁇ r ⁇ llel FFT function
- Decryption is carried out in a similar way, going up each step illustrated in Figure 7.
- the encryption process can be carried out by a circuit which uses "pipeline" technology: by cutting the calculation network into several successive layers, each layer is produced by a logic circuit and registers are inserted between each layer. This makes it possible to process a stream of data to be encrypted with a higher speed.
Abstract
Description
Claims
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU95443/98A AU9544398A (en) | 1997-10-10 | 1998-10-09 | Novel digital cryptography method by selector box |
JP52117299A JP2001506773A (en) | 1997-10-10 | 1998-10-09 | A new method of digital encryption with mixed boxes |
CA002274938A CA2274938A1 (en) | 1997-10-10 | 1998-10-09 | Novel digital cryptography method by selector box |
EP98949030A EP0944975A1 (en) | 1997-10-10 | 1998-10-09 | Novel digital cryptography method by selector box |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR97/12683 | 1997-10-10 | ||
FR9712683A FR2769726B1 (en) | 1997-10-10 | 1997-10-10 | NEW METHOD OF DIGITAL MIXTURE CRYPTOGRAPHY |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999020018A1 true WO1999020018A1 (en) | 1999-04-22 |
Family
ID=9512083
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1998/002169 WO1999020018A1 (en) | 1997-10-10 | 1998-10-09 | Novel digital cryptography method by selector box |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP0944975A1 (en) |
JP (1) | JP2001506773A (en) |
AU (1) | AU9544398A (en) |
CA (1) | CA2274938A1 (en) |
FR (1) | FR2769726B1 (en) |
WO (1) | WO1999020018A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4275265A (en) * | 1978-10-02 | 1981-06-23 | Wisconsin Alumni Research Foundation | Complete substitution permutation enciphering and deciphering circuit |
US4751733A (en) * | 1985-05-15 | 1988-06-14 | Thomson-Csf | Substitution permutation enciphering device |
US5231662A (en) * | 1989-08-01 | 1993-07-27 | Tulip Computers International B.V. | Method and device for enciphering data to be transferred and for deciphering the enciphered data, and a computer system comprising such a device |
WO1997022192A1 (en) * | 1995-12-08 | 1997-06-19 | Northern Telecom Limited | Constructing symmetric ciphers using the cast design procedure |
-
1997
- 1997-10-10 FR FR9712683A patent/FR2769726B1/en not_active Expired - Fee Related
-
1998
- 1998-10-09 AU AU95443/98A patent/AU9544398A/en not_active Abandoned
- 1998-10-09 JP JP52117299A patent/JP2001506773A/en active Pending
- 1998-10-09 EP EP98949030A patent/EP0944975A1/en not_active Withdrawn
- 1998-10-09 CA CA002274938A patent/CA2274938A1/en not_active Abandoned
- 1998-10-09 WO PCT/FR1998/002169 patent/WO1999020018A1/en not_active Application Discontinuation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4275265A (en) * | 1978-10-02 | 1981-06-23 | Wisconsin Alumni Research Foundation | Complete substitution permutation enciphering and deciphering circuit |
US4751733A (en) * | 1985-05-15 | 1988-06-14 | Thomson-Csf | Substitution permutation enciphering device |
US5231662A (en) * | 1989-08-01 | 1993-07-27 | Tulip Computers International B.V. | Method and device for enciphering data to be transferred and for deciphering the enciphered data, and a computer system comprising such a device |
WO1997022192A1 (en) * | 1995-12-08 | 1997-06-19 | Northern Telecom Limited | Constructing symmetric ciphers using the cast design procedure |
Also Published As
Publication number | Publication date |
---|---|
CA2274938A1 (en) | 1999-04-22 |
FR2769726B1 (en) | 2002-12-13 |
JP2001506773A (en) | 2001-05-22 |
AU9544398A (en) | 1999-05-03 |
FR2769726A1 (en) | 1999-04-16 |
EP0944975A1 (en) | 1999-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2570617C (en) | Method and device for carrying out a cryptographic calculation | |
EP2499773B1 (en) | Low-complexity electronic circuit protected by customized masking | |
US20120281827A1 (en) | Pseudo-random Number Generation Based on Periodic Sampling of One or More Linear Feedback Shift Registers | |
Balajee et al. | Evaluation of key dependent S-box based data security algorithm using Hamming distance and balanced output | |
FR2765056A1 (en) | BLOCK ENCRYPTION ALGORITHM WITH ROBUST SAFETY AGAINST DIFFERENTIAL CRYPTOGRAPHIC ANALYSIS, LINEAR CRYPTOGRAPHIC ANALYSIS AND HIGHER ORDER DIFFERENTIAL CRYPTOGRAPHIC ANALYSIS | |
EP1733502A1 (en) | Processor for executing an aes-type algorithm | |
Riman et al. | Comparative analysis of block cipher-based encryption algorithms: a survey | |
Sakib | ANALYSIS ON FUNDAMENTAL ALGEBRAIC CONCEPTS AND INFORMATION SECURITY SYSTEM | |
FR2974693A1 (en) | METHOD FOR APPLYING HIGH ENTROPY MASKING CONTRATE IN BLOCK ENCRYPTION ALGORITHM, AND LOGIC INTEGRATED CIRCUIT USING SUCH A METHOD | |
US6301361B1 (en) | Encoding and decoding information using randomization with an alphabet of high dimensionality | |
EP0935858B1 (en) | Method for data decorrelation | |
Fahrianto | End-to-end encryption on the instant messaging application based android using aes cryptography algorithm to a text message | |
WO1999020018A1 (en) | Novel digital cryptography method by selector box | |
US20030152233A1 (en) | Method of encryption | |
FR2802741A1 (en) | DEVICE USING A ROUND REPETITION BLOCK ENCRYPTION ALGORITHM | |
Soe et al. | Performance analysis of data encryption standard (DES) | |
CN101938352A (en) | Block cipher software encrypting method | |
Kadry et al. | An improvement of RC4 cipher using vigenère cipher | |
EP1984813A2 (en) | Cryptographic device and method for generating pseudo-random numbers | |
Fleischmann et al. | Attacking reduced rounds of the ARIA block cipher | |
Baftiu | ANALYSIS AND USE OF CRYPTOGRAPHY TECHNIQUES IN PROGRAMMING LANGUAGE C | |
FR2924550A1 (en) | METHODS AND DEVICES FOR ENCRYPTING AND DECRYPTING A DATA MESSAGE WITH A RANDOM SECRET KEY. | |
Siahaan et al. | Data Security using 128-bit Advanced Encryption Standard Algorithm | |
Kumar et al. | Enhanced cost effective symmetric key algorithm for small amount of data | |
Dharbhashayanam et al. | Redesigned and reinforced low-power data encryption standard using hash codes for high-speed and high-secure applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GD GE GH GM HR HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
ENP | Entry into the national phase |
Ref document number: 2274938 Country of ref document: CA Ref country code: CA Ref document number: 2274938 Kind code of ref document: A Format of ref document f/p: F |
|
ENP | Entry into the national phase |
Ref country code: JP Ref document number: 1999 521172 Kind code of ref document: A Format of ref document f/p: F |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1998949030 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1998949030 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 09319571 Country of ref document: US |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 1998949030 Country of ref document: EP |