Data-driven Block Ciphers for Fast Telecommunication SystemsThe Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive |
Contents
Chapter 1 Short Introduction to Cryptography | 1 |
Chapter 2 Permutation Networks as Primitive of DataDriven Ciphers | 31 |
Chapter 3 DataDriven Primitives and Ciphers Based on Controlled SubstitutionPermutation Networks | 69 |
Chapter 4 Switchable DataDependent Operations | 107 |
Chapter 5 DataDriven Ciphers Suitable for Software Implementation | 157 |
177 | |
183 | |
Back cover | 187 |
Other editions - View all
Data-driven Block Ciphers for Fast Telecommunication Systems Nikolai Moldovyan,Alexander A. Moldovyan No preview available - 2007 |
Common terms and phrases
active bits active layers arbitrary architecture ASIC attacks avalanche effect balanced BFs binary vector bit permutation block ciphers cipher design ciphers based ciphertext considered controlled involutions controlled operations controlling bits controlling data subblock controlling vector CP boxes Crypt cryptanalysis cryptographic primitive cryptosystems CSPNs data-driven DDO boxes DDO-based DDP operations DDP-based ciphers DDSS DDSS-based define denotes described differential cryptanalysis efficient elementary controlled encryption algorithm encryption round extension box F2/1 elements fixed permutations Fn/m boxes FPGA hardware implementation hash function input bits input data block iterative key scheduling key-dependent keystream linear linear cryptanalysis modifications Moldovyan mutually inverse n-bit nonlinear number of active order h performed plaintext probability procedure recursive construction represented right data subblock round keys round transformation SDDO secret key shown in Figure stream ciphers structure subkey selection substitution switchable switching elements symmetric topology t p(t tion topology Twofish variables
Popular passages
Page ii - A Practical Guide to Content Delivery Networks Gilbert Held ISBN: 0-8493-3649-X Resource, Mobility, and Security Management in Wireless Networks and Mobile Communications Van Zhang, Honglin Hu, and Masayuki Fujise ISBN: 0-8493-8036-7 Security in Distributed, Grid, Mobile, and Pervasive Computing Yang Xiao ISBN: 0-8493-7921-0 TCP Performance over UMTS-HSDPA Systems Mohamad Assaad and Djamal Zeghlache ISBN: 0-8493-6838-3 Testing Integrated QoS of VoIP: Packets to Perceptual Voice Quality Vlatko Lipovac...