A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

被引:2
|
作者
Sastry, V. U. K. [1 ]
Shankar, N. Ravi [2 ]
Bhavani, S. Durga [3 ]
机构
[1] Sreenidhi Inst Sci & Technol, Sch Comp Sci & Informat, Hyderabad, Andhra Pradesh, India
[2] Keshav Mem Inst Technol, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[3] Jawaharlal Nehru Technol Univ Hyderabad, Sch Informat Technol, Hyderabad, Andhra Pradesh, India
关键词
Modular arithmetic inverse; interlacing; decomposition; permutation; inverse permutation;
D O I
10.2478/cait-2013-0025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.
引用
收藏
页码:50 / 63
页数:14
相关论文
共 50 条
  • [1] A block cipher involving interlacing and decomposition
    SreeNidhi Institute of Science and Technology, Hyderabad, India
    不详
    Inf. Technol. J., 2007, 3 (396-404): : 396 - 404
  • [2] A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution
    Sastry, V. U. K.
    Shirisha, K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 131 - 138
  • [3] Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution
    Sastry, V. U. K.
    Shirisha, K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (12) : 116 - 122
  • [4] An Iterative Process Involving Interlacing and Decoposition in the Devlopment of a Block Cipher
    Kumar, S. Udaya
    Sastry, V. U. K.
    Babu, A. Vinaya
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2006, 6 (10): : 236 - 245
  • [5] A Block Cipher using an Iterative Method involving a Permutation
    Susarla, Lakshmi Bhavani Madhuri
    Kumar, S. Udaya
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 275 - 292
  • [6] A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with XOR Operation and Supported by Key-Based Permutation and Substitution
    Sastry, V. U. K.
    Shirisha, K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (01) : 187 - 194
  • [7] A modified hill cipher involving interweaving and iteration
    Umakanta Sastry, V.
    Ravi Shankar, N.
    Durga Bhavani, S.
    International Journal of Network Security, 2010, 11 (01) : 11 - 16
  • [8] Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm
    Khan, Waqar Ahmad
    Gondal, Muhammad Asif
    3D RESEARCH, 2014, 5 (04):
  • [9] Block Cipher in the Ideal Cipher Model: A Dedicated Permutation Modeled as a Black-Box Public Random Permutation
    Nawaz, Yasir
    Wang, Lei
    SYMMETRY-BASEL, 2019, 11 (12):
  • [10] Implementation Details for The Cipher Key Generation Cardano Permutation
    Gryciuk, Yurij
    Grytsyuk, Pavlo
    2016 13TH INTERNATIONAL CONFERENCE ON MODERN PROBLEMS OF RADIO ENGINEERING, TELECOMMUNICATIONS AND COMPUTER SCIENCE (TCSET), 2016, : 498 - 502