Abstract
To increase efficiency of modern information-protection systems, a new approach to design of fast encryption algorithms is proposed based on controlled two-place operations. Models, design, and mathematical features of controlled two-place operations are considered. Principles of application of such operations to iterative cryptoschemes are discussed.
Similar content being viewed by others
REFERENCES
A. A. Moldovyan and N. A. Moldovyan, “Software encryption algorithms for transparent protection technology,” Cryptologia, 22, No. 1, 56-68 (1998).
A. A. Moldovyan and N. A. Moldovyan, “Flexible algorithms of information protection in automated control systems,” Avtom. Telemekh., No. 8, 166-176 (1998).
A. A. Moldovyan and N. A. Moldovyan, “High-speed ciphers based on a new cryptography primitive,” in: Safety of Information Technologies [in Russian], Issue 1, MIFI, Moscow (1999), pp. 82-88.
L. E. Alekseev, A. A. Moldovyan and N. A. Moldovyan, “Prospects of development of high-speed ciphers based on controlled permutations,” Vopr. Zashch. Inform., No. 1, 41-47 (1999).
A. A. Moldovyan and N. A. Moldovyan, “A method of cryptography transformation of blocks of binary data,” Patent of the Russian Federation No. 2141729, MPK6 H04 L 9/28, Publushed Oct. 20, 1999, Bul No. 30.
A. A. Moldovyan, N. A. Moldovyan, and P. A. Moldovyanu, “A method of cryptography transformation of blocks of figures,” Patent of the Russian Federation No. 2140716, MPK6 H04 L 9/28, Published Oct. 27, 1999, Bul. No. 30.
H. Feistel, “Cryptography and computer privacy,” Scientific American, 228, No. 5, 15-23 (1973).
E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, Berlin (1993).
M. Matsui, “Linear cryptoanalysis method for DES cipher,” in: Proc. Eurocrypt'93. Advances in Cryptology, Springer-Verlag, Berlin (1994), pp. 386-397.
K. Nyberg, “Differentially uniform mappings for cryptograph,” in: Proc. Eurocrypt'93. Advances in Cryptology, Springer-Verlag, Berlin (1994), pp. 55-64.
K. Nyberg, “Linear approximations of block ciphers,” in: Proc. Eurocrypt'94. Advances in Cryptology, Springer-Verlag, Berlin (1994), pp. 139-144.
K. Nyberg, “Constructions of bent functions and difference sets,” in: Proc. Eurocrypt'90. Advances in Cryptology, Springer-Verlag, Berlin (1991), pp. 151-160.
K. Kurosawa and T. Satoh, “Design of SAC/PC (l) l of order k Boolean functions and three other cryptographic criteria,” in: Proc. Eurocrypt'97. Advances in Cryptology, Springer-Verlag, Berlin (1998), pp. 434-449.
K. Nyberg and L. R. Knudsen, “Provable security against differential cryptoanalysis,” in: Proc. Crypto'92. Advances in Cryptology, Springer-Verlag, Berlin (1993), pp. 566-571.
X. Lai, J.-L. Massey, and S. Murphy, “Markov ciphers and differential cryptanalysis,” in: Proc. Eurocrypt'91. Advances in Cryptology. Springer-Verlag, Berlin (1992), pp. 17-38.
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Izotov, B.V., Moldovyan, A.A. & Moldovyan, N.A. Algorithms for Information Conversion Based on Controlled Two-Place Operations. Cybernetics and Systems Analysis 39, 305–315 (2003). https://doi.org/10.1023/A:1024703726006
Issue Date:
DOI: https://doi.org/10.1023/A:1024703726006