A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration

被引:2
|
作者
Sastry, V. U. K. [1 ]
Shankar, N. Ravi [2 ]
Bhavani, S. Durga [3 ]
机构
[1] Sreenidhi Inst Sci & Technol, Sch Comp Sci & Informat, Hyderabad, Andhra Pradesh, India
[2] Keshav Mem Inst Technol, Dept Comp Sci & Engn, Hyderabad, Andhra Pradesh, India
[3] Jawaharlal Nehru Technol Univ Hyderabad, Sch Informat Technol, Hyderabad, Andhra Pradesh, India
关键词
Modular arithmetic inverse; interlacing; decomposition; permutation; inverse permutation;
D O I
10.2478/cait-2013-0025
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we have developed a block cipher, wherein the size of the key matrix is 384 bits and the size of the plain text is as large as we choose. The permutation, the interlacing and the iteration introduced in this analysis are found to cause diffusion and confusion efficiently. Hence, the strength of the cipher proves to be remarkable.
引用
收藏
页码:50 / 63
页数:14
相关论文
共 50 条
  • [21] Block Permutation Cipher in Chaos with Feistel Structure for Wireless Sensor Networks
    Chen, Shuai
    Shu, Renyi
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 2, 2011, 105 : 391 - +
  • [22] Permutation Based Image Encryption Algorithm using Block Cipher Approach
    Rawat, Aditya
    Gupta, Ipshita
    Goel, Yash
    Sinha, Nishith
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1877 - 1882
  • [23] A Block Cipher Involving a Key Bunch Matrix and an Additional Key Matrix, Supplemented with Modular Arithmetic Addition and supported by Key-based Substitution
    Sastry, V. U. K.
    Shirisha, K.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (12) : 110 - 115
  • [24] D-PRESENT: A Lightweight Block Cipher with Dynamic Key-Dependent Substitution Boxes
    Labio, Ronniel D.
    Festijo, Enrique D.
    ICACSIS 2020: 2020 12TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND INFORMATION SYSTEMS (ICACSIS), 2020, : 27 - 32
  • [25] A Block Cipher Using Key-Dependent S-box and P-boxes
    Zhang, Runtong
    Chen, Like
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS, VOLS 1-5, 2008, : 311 - 316
  • [26] A large block cipher using linear congruences
    Sastry, V. U. K.
    Janaki, V.
    WCECS 2007: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, 2007, : 294 - 298
  • [27] Key Dependent Cipher Scheme for Sensor Networks
    Noura, Hassan
    Martin, Steven
    Al Agha, Khaldoun
    Grote, Walter
    2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 148 - 154
  • [28] How to distinguish between a block cipher and a random permutation by lowering the input entropy
    Hernández, JC
    Isasi, P
    Sierra, JM
    Gonzalez-Tablas, A
    35TH ANNUAL 2001 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2001, : 289 - 292
  • [29] PERMUTATION INDUCED SHUFFLING BASED BLOCK CIPHER FOR REAL-TIME APPLICATIONS
    Radha, N.
    Venkatesulu, M.
    MALAYSIAN JOURNAL OF COMPUTER SCIENCE, 2014, 27 (01) : 20 - 34
  • [30] Primitivity of the group of a cipher involving the action of the key-schedule
    Calderini, Marco
    JOURNAL OF ALGEBRA AND ITS APPLICATIONS, 2021, 20 (05)