WO2012060685A8 - A method for linear transformation in substitution-permutation network symmetric-key block cipher - Google Patents
A method for linear transformation in substitution-permutation network symmetric-key block cipher Download PDFInfo
- Publication number
- WO2012060685A8 WO2012060685A8 PCT/MY2011/000105 MY2011000105W WO2012060685A8 WO 2012060685 A8 WO2012060685 A8 WO 2012060685A8 MY 2011000105 W MY2011000105 W MY 2011000105W WO 2012060685 A8 WO2012060685 A8 WO 2012060685A8
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- permutation
- matrix
- key
- deriving
- scalar
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
Abstract
One embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l. The method comprising deriving multiplicative scalar from binary input; multiplying given matrix with multiplicative scalar, producing first intermediate matrix; deriving first permutation of n objects from binary input; permuting rows of first intermediate matrix according to first permutation, producing second intermediate matrix; deriving second permutation of n objects from binary input; and permuting columns of second intermediate matrix according to second permutation to produce final MDS matrix. Another embodiment of the present invention is a method of linear transformation in Substitution-Permutation Network symmetric-key block cipher producing n x n key-dependent MDS matrices from given n x n MDS matrix by scalar multiplication and permutations of elements of given matrix where multiplicative scalar and permutations are derived from binary inputs of length l. The method comprising deriving multiplicative scalar from the key (202); multiplying given matrix with multiplicative scalar to produce first intermediate matrix (204); deriving first permutation of n objects from the key (206); permuting rows of first intermediate matrix according to first permutation to produce second intermediate matrix (208); deriving second permutation of n objects from the key (304); and permuting columns of second intermediate matrix according to second permutation (212) to produce final MDS matrix (214).
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010005206 MY150357A (en) | 2010-11-04 | 2010-11-04 | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
MYPI2010005206 | 2010-11-04 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2012060685A1 WO2012060685A1 (en) | 2012-05-10 |
WO2012060685A8 true WO2012060685A8 (en) | 2016-09-01 |
Family
ID=46024655
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/MY2011/000105 WO2012060685A1 (en) | 2010-11-04 | 2011-06-17 | A method for linear transformation in substitution-permutation network symmetric-key block cipher |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY150357A (en) |
WO (1) | WO2012060685A1 (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2484890A (en) | 2010-08-17 | 2012-05-02 | Artemis Intelligent Power Ltd | Ring cam ensuring smooth follower handover between segments |
CN102713260A (en) | 2010-08-17 | 2012-10-03 | 阿尔特弥斯智能动力有限公司 | Fluid-working machine with multi-lobe ring cam |
CA3167530A1 (en) * | 2020-01-10 | 2021-07-15 | Zeu Technologies, Inc. | A method for symmetric asynchronous generative encryption |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2327911A1 (en) * | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
JP4561252B2 (en) * | 2004-09-03 | 2010-10-13 | ソニー株式会社 | Cryptographic processing apparatus, cryptographic processing method, and computer program |
US9336160B2 (en) * | 2008-10-30 | 2016-05-10 | Qualcomm Incorporated | Low latency block cipher |
-
2010
- 2010-11-04 MY MYPI2010005206 patent/MY150357A/en unknown
-
2011
- 2011-06-17 WO PCT/MY2011/000105 patent/WO2012060685A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
MY150357A (en) | 2013-12-31 |
WO2012060685A1 (en) | 2012-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Daemen et al. | Rijndael. | |
Kazymyrov et al. | A method for generation of high-nonlinear s-boxes based on gradient descent | |
CA2632857A1 (en) | Closed galois field combination | |
Liu et al. | An AES S-box to increase complexity and cryptographic analysis | |
Jovanovic et al. | An algebraic fault attack on the LED block cipher | |
MY151698A (en) | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |
CN103051442B (en) | Cipher device adopting Feistel-PG structure and encryption method | |
WO2010021900A3 (en) | Preamble extensions for communications | |
WO2010105915A3 (en) | Method for providing a cryptic pair of keys | |
WO2009028889A3 (en) | Key input interface method | |
WO2009093865A3 (en) | System and method for pseudorandom permutation for interleaving in wireless communications | |
Xiao et al. | Using the self-synchronizing method to improve security of the multi chaotic systems-based image encryption | |
WO2012060685A8 (en) | A method for linear transformation in substitution-permutation network symmetric-key block cipher | |
DE502006005410D1 (en) | DETERMINATION OF A MODULAR INVERSE | |
Alfarano et al. | ShiftRows alternatives for AES-like ciphers and optimal cell permutations for Midori and Skinny | |
WO2009141756A3 (en) | Cryptographic system | |
GR1007291B (en) | Matrix inversion using qr decoposition on a parallel pipelined systolic array | |
WO2008114829A1 (en) | Encryption device, decryption device, encryption program, decryption program, and recording medium | |
Van Le et al. | Complementation-like and cyclic properties of AES round functions | |
WO2008010685A8 (en) | Key input device and character input method using center key | |
WO2013112118A3 (en) | Instructions to perform jh cryptographic hashing in a 256 bit data path | |
CN104753662B (en) | Encryption key stream generation method based on aes algorithm | |
CN104601321A (en) | Key expansion method and device | |
WO2011105834A3 (en) | Method for generating codewords | |
WO2005096135A8 (en) | Method and device for performing a cryptographic operation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11838285 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase in: |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11838285 Country of ref document: EP Kind code of ref document: A1 |