Skip to main content
Log in

Algorithms for Information Conversion Based on Controlled Two-Place Operations

  • Published:
Cybernetics and Systems Analysis Aims and scope

Abstract

To increase efficiency of modern information-protection systems, a new approach to design of fast encryption algorithms is proposed based on controlled two-place operations. Models, design, and mathematical features of controlled two-place operations are considered. Principles of application of such operations to iterative cryptoschemes are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. A. A. Moldovyan and N. A. Moldovyan, “Software encryption algorithms for transparent protection technology,” Cryptologia, 22, No. 1, 56-68 (1998).

    Google Scholar 

  2. A. A. Moldovyan and N. A. Moldovyan, “Flexible algorithms of information protection in automated control systems,” Avtom. Telemekh., No. 8, 166-176 (1998).

  3. A. A. Moldovyan and N. A. Moldovyan, “High-speed ciphers based on a new cryptography primitive,” in: Safety of Information Technologies [in Russian], Issue 1, MIFI, Moscow (1999), pp. 82-88.

    Google Scholar 

  4. L. E. Alekseev, A. A. Moldovyan and N. A. Moldovyan, “Prospects of development of high-speed ciphers based on controlled permutations,” Vopr. Zashch. Inform., No. 1, 41-47 (1999).

  5. A. A. Moldovyan and N. A. Moldovyan, “A method of cryptography transformation of blocks of binary data,” Patent of the Russian Federation No. 2141729, MPK6 H04 L 9/28, Publushed Oct. 20, 1999, Bul No. 30.

  6. A. A. Moldovyan, N. A. Moldovyan, and P. A. Moldovyanu, “A method of cryptography transformation of blocks of figures,” Patent of the Russian Federation No. 2140716, MPK6 H04 L 9/28, Published Oct. 27, 1999, Bul. No. 30.

  7. H. Feistel, “Cryptography and computer privacy,” Scientific American, 228, No. 5, 15-23 (1973).

    Google Scholar 

  8. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, Berlin (1993).

    Google Scholar 

  9. M. Matsui, “Linear cryptoanalysis method for DES cipher,” in: Proc. Eurocrypt'93. Advances in Cryptology, Springer-Verlag, Berlin (1994), pp. 386-397.

    Google Scholar 

  10. K. Nyberg, “Differentially uniform mappings for cryptograph,” in: Proc. Eurocrypt'93. Advances in Cryptology, Springer-Verlag, Berlin (1994), pp. 55-64.

    Google Scholar 

  11. K. Nyberg, “Linear approximations of block ciphers,” in: Proc. Eurocrypt'94. Advances in Cryptology, Springer-Verlag, Berlin (1994), pp. 139-144.

    Google Scholar 

  12. K. Nyberg, “Constructions of bent functions and difference sets,” in: Proc. Eurocrypt'90. Advances in Cryptology, Springer-Verlag, Berlin (1991), pp. 151-160.

    Google Scholar 

  13. K. Kurosawa and T. Satoh, “Design of SAC/PC (l) l of order k Boolean functions and three other cryptographic criteria,” in: Proc. Eurocrypt'97. Advances in Cryptology, Springer-Verlag, Berlin (1998), pp. 434-449.

    Google Scholar 

  14. K. Nyberg and L. R. Knudsen, “Provable security against differential cryptoanalysis,” in: Proc. Crypto'92. Advances in Cryptology, Springer-Verlag, Berlin (1993), pp. 566-571.

    Google Scholar 

  15. X. Lai, J.-L. Massey, and S. Murphy, “Markov ciphers and differential cryptanalysis,” in: Proc. Eurocrypt'91. Advances in Cryptology. Springer-Verlag, Berlin (1992), pp. 17-38.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Izotov, B.V., Moldovyan, A.A. & Moldovyan, N.A. Algorithms for Information Conversion Based on Controlled Two-Place Operations. Cybernetics and Systems Analysis 39, 305–315 (2003). https://doi.org/10.1023/A:1024703726006

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1023/A:1024703726006

Navigation