A Layered Approach to the Design of Private Key Cryptosystems

  • T. E. Moore
  • S. E. Tavares
Conference paper

DOI: 10.1007/3-540-39799-X_18

Part of the Lecture Notes in Computer Science book series (LNCS, volume 218)
Cite this paper as:
Moore T.E., Tavares S.E. (1986) A Layered Approach to the Design of Private Key Cryptosystems. In: Williams H.C. (eds) Advances in Cryptology — CRYPTO ’85 Proceedings. CRYPTO 1985. Lecture Notes in Computer Science, vol 218. Springer, Berlin, Heidelberg


This paper presents a layered approach to the design of private key cryptographic algorithms based on a few strategically chosen layers. Each layer is a conceptually simple invertible transformation that may be weak in isolation, but makes a necessary contribution to the security of the algorithm. This is in contrast to algorithms such as DES which utilize many layers and depend on S-boxes that have no simple mathematical interpretation. A property called transparency is introduced to deal with the interaction of layers and how they must be selected to eliminate system weaknesses.

Utilizing this layered approach, a private key cryptographic algorithm consisting of three layers is constructed to demonstrate the design criteria. The algorithm has an adequate key space and valid keys can be easily generated. The design is based on a symmetrical layered configuration, which allows encryption and decryption to be performed using the same algorithm. The algorithm is suitable for VLSI implementation. Some statistical tests are applied to the algorithm in order that its cryptographic performance can be evaluated. The test results and attempts at cryptanalysis suggest that the three-layered algorithm is secure.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 1986

Authors and Affiliations

  • T. E. Moore
    • 1
  • S. E. Tavares
    • 1
  1. 1.Department of Electrical EngineeringQueen’s UniversityKingstonCanada

Personalised recommendations