Abstract
Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers. Some variants of the DDP operations and their application in the cipher CIKS-1 are considered. A feature of CIKS-1 is the use of both the data-dependent transformation of round subkeys and the key-dependent DDP operations.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
W. Becker, Method and system for machine enciphering and deciphering, U.S. patent #4157454 (1979).
A. Biryukov and E. Kushilevitz, Improved cryptanalysis of RC5, Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, Advances in Cryptology — EUROCRYPT ’98, Lecture Notes in Computer Science, vol. 1403, Springer-Verlag, Berlin, 1998, pp. 85–99.
C. Burwick, D. Coppersmith, E. D’Avingnon, R. Gennaro, Sh. Halevi, Ch. Jutla, Jr., S.M. Matyas, L. O’Connor, M. Peyravian, D. Safford, and N. Zunic, MARS—a candidate cipher for AES, Proceedings of the 1st Advanced Encryption Standard Candidate Conference, Venture, California, Aug. 20–22, 1998 (see also http://www.nist.gov/aes).
A.S. Kalendarev, A.A. Moldovyan, N.A. Moldovyan, and N.B. Savlukov, Encryption box, Russian patent #2127024, Bull. no. 6 (1999).
B.S. Kaliski and Y.L. Yin, On differential and linear cryptanalysis of the RC5 encryption algorithm, Proceedings of the 15th Annual International Cryptology Conference, Advances in Cryptology — CRYPTO ’95, Lecture Notes in Computer Science, vol. 963, Springer-Verlag, Berlin, 1995, pp. 171–184.
M. Kwan, The design of the ICE encryption algorithm, Proceedings of the 4th International Workshop, Fast Software Encryption — FSE ’97, Lecture Notes in Computer Science, vol. 1267, Springer-Verlag, Berlin, 1997, pp. 69–82.
R.L. Knudsen and W. Meier, Improved differential attacks on RC5, Proceedings of the 16th Annual International Cryptology Conference, Advances in Cryptology — CRYPTO ’96, Lecture Notes in Computer Science, vol. 1109, Springer-Verlag, Berlin, 1996, pp. 216–228.
W.E. Madryga, A high performance encryption algorithm, Computer Security: a Global Challenge, Elsevier, Amsterdam, 1984, pp. 557–570.
V.M. Maslovsky, A.A. Moldovyan, and N.A. Moldovyan, A method of the block encryption of discrete data, Russian patent # 2140710. Bull. no. 30 (1999).
A.A. Moldovyan and N.A. Moldovyan, A method of the cryptographical transformation of binary data blocks, Russian patent # 2141729. Bull. no. 32 (1999).
R.L. Rivest, The RC5 encryption algorithm, Proceedings of the 2nd International Workshop, Fast Software Encryption — FSE ’94, Lecture Notes in Computer Science, vol. 1008, Springer-Verlag, Berlin, 1995, pp. 86–96.
R.L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin, The RC6 block cipher, Proceedings of the 1st Advanced Encryption Standard Candidate Conference, Venture, California, Aug. 20–22, 1998 (see also http://www.nist.gov/aes).
A.A. Waksman, Permutation network, Journal of the ACM, vol. 15, no. 1 (1968), pp. 159–163.
Author information
Authors and Affiliations
Additional information
Communicated by Ernie Brickell
Online publication 29 August 2001
This work was carried out as part of the AFRL Funded Project #1994P which supported the authors.
Rights and permissions
About this article
Cite this article
Moldovyan, A.A., Moldovyan, N.A. A cipher based on data-dependent permutations. J. Cryptology 15, 61–72 (2002). https://doi.org/10.1007/s00145-001-0012-9
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00145-001-0012-9