Skip to main content
Log in

Permutation code encryption—New achievement based on path encryption

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

By researching into the attack to present block cipher, we find an essential reason leading to the assailable encryption strength, set up a new block cipher idea and put forward a block cipher encryption concept path encryption. We present permutation code encryption which is based on path encryption. Now permutation code encryption is a patent of Chinese invention. In Permutation Code Encryption, we use a pseudo-random sequence of the keys to control the paths. The simulation result shows that forn-bit block the encryption strength is novel higher than 2″ and the algorithm can finish the encryption of one block in 7.5 ns, which is unrelated with the block length.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Jakimoski G, Desmedt Y. Related-Key Differential Cryptanalysis of 192-Bit Key AES Variants[C]//10th Annual International Workshop SAC 2003. Berlin: Springer, 2004: 208–221.

    Google Scholar 

  2. Kajiwara H, Takahira K, Katayama T. Development of DES Analysis and Synthesis Toolbox[C]//SICE 2003Annual Conference. Fukui: IEEE Press, 2003: 234–238.

    Google Scholar 

  3. Matsui M. Linear Cryptanalysis Method for DES Cipher [C]//Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology. New York: Springer-Verlag, 1994: 386–397.

    Google Scholar 

  4. Wang Lin. Crypto-Analysis of the Encryption Algorithm Rijndael[J].The Journal of China University of Posts and Telecommunications, 2001,8(2):32–34(Ch).

    Google Scholar 

  5. Biham E, Shamir A. Differential Cryptanalysis of DES-Like Cryptosystems[J].Journal of Cryptology, 1991,4(1):72.

    Article  MathSciNet  Google Scholar 

  6. Feng Dengguo.Cryptanalysis[M]. Beijing: Tsinghua University Press, 2000(Ch).

    Google Scholar 

  7. Feng Dengguo, Pei Dingyi.the Introduction of Cryptology [M]. Beijing: Science Press, 1999(Ch).

    Google Scholar 

  8. Lin Zi, Xu Yong, Li Kuijun. CRH Public Encryption—The Study on High Intensity Data Encryption Algorithm[J].Journal of China University of Posts and Telecommunications, 2000,7(1):51–55(Ch).

    Google Scholar 

  9. Gurkaynak F K, Burq A. A 2 Gb/s Balanced AES Crypto-Chip Implementation[C]//Proceedings of the 2004ACM Greatlakes Symposium on VLSI, New York: ACM Press, 2004:39–44.

    Google Scholar 

  10. Paris K, Nicolas S. An FPGA-Based Performance Comparison of the 64-Bit Block Ciphers[C]//5th International Symposium on Intelligent Automation and Control. New York: IEEE Press, 2004:427–432.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wu Jinmu.

Additional information

Biography: WU Jinmu (1946-), male, Professor, research direction: cryptography, information security.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jinmu, W., Maohua, L., Guiqin, F. et al. Permutation code encryption—New achievement based on path encryption. Wuhan Univ. J. Nat. Sci. 11, 1581–1584 (2006). https://doi.org/10.1007/BF02831825

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02831825

Key words

CLC number

Navigation