Two-Key Dependent Permutation for Use in Symmetric Cryptographic System

被引:0
作者
Kuppusamy, Arulmani [1 ]
Iyer, Swaminathan Pitchai [2 ]
Krithivasan, Kannan [3 ]
机构
[1] SASTRA Univ, Dept Comp Sci Engn, Srinivasa Ramanujan Ctr, Kumbakonam 612001, India
[2] SASTRA Univ, Sch Comp, Thanjavur 613401, India
[3] SASTRA Univ, Sch Humanities & Sci, Thanjavur 613401, India
关键词
S-BOX GENERATION;
D O I
10.1155/2014/795292
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This paper deals with a two-key based novel approach for generating a permutation table that can be used in a symmetric cryptographic system to cause diffusion. It also discusses how the permutation table generated using the approach can be applied to character based encryption and binary data block produced at intermediate stages by symmetric cipher algorithms. It also describes the effect of our approach on characters of intermediate text as well as on bits of binary data block along with the impact of a single bit change in key information on producing permutation sequences applied to plaintexts to produce ciphertexts. The results are satisfactory and the proposed approach can be employed in any symmetric block cipher algorithm that uses the predefined permutation tables.
引用
收藏
页数:12
相关论文
共 20 条
  • [1] Abd-ElGhafar A., 2009, P 13 INT C AER SCI A
  • [2] Adams CM, 1993, P 3 S STAT PROGR RES, P181
  • [3] [Anonymous], 2814789 GOST
  • [4] [Anonymous], 1994, Fast Software Encryption, DOI DOI 10.1007/3-540-58108-1_24
  • [5] Biham E., 1993, Differ. Cryptanal. Data Encrypt. Stand., DOI [10.1007/978-1-4613-9314-6, DOI 10.1007/978-1-4613-9314-6]
  • [6] El-Sheikh HM., 2012, INT J COMPUTER THEOR, V4, P158, DOI [10.7763/IJCTE.2012.V4.442, DOI 10.7763/IJCTE.2012.V4.442]
  • [7] Kazlauskas K, 2009, INFORMATICA-LITHUAN, V20, P23
  • [8] Koblitz N., 1994, A Course in Number Theory and Cryptography
  • [9] COMPARISON OF RANDOM S-BOX GENERATION METHODS
    Lambic, Dragan
    Zivkovic, Miodrag
    [J]. PUBLICATIONS DE L INSTITUT MATHEMATIQUE-BEOGRAD, 2013, 93 (107): : 109 - 115
  • [10] Matsui M., 1993, Advances in Cryptology, V765, P386, DOI [DOI 10.1007/3-540-48285-7, 10.1007/3-540-48285-733, DOI 10.1007/3-540-48285-733]