Controlled operations as a cryptographic primitive

7Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Controlled two-place operations (CTPO) are introduced as a new cryptographic primitive for the block ciphers. Design criteria, structure, some good cryptographic properties of the CTPO are considered. There are proposed CTPO representing single nonlinear operations on the operands of relatively large length. It is shown that CTPO in combination with the controlled permutations (CP) can be efficiently used to construct fast block ciphers. Three different cryptoschemes based on data-dependent two-place operations and data-dependent permutations are presented. A feature of the cryptoschemes is the use of the CTPO and CP for construction of some mechanisms of the internal key scheduling which consists in data-dependent transformation of the round keys.

Cite

CITATION STYLE

APA

Izotov, B. V., Moldovyan, A. A., & Moldovyan, N. A. (2001). Controlled operations as a cryptographic primitive. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2052, pp. 230–241). Springer Verlag. https://doi.org/10.1007/3-540-45116-1_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free