A Layered Approach to the Design of Private Key Cryptosystems
This paper presents a layered approach to the design of private key cryptographic algorithms based on a few strategically chosen layers. Each layer is a conceptually simple invertible transformation that may be weak in isolation, but makes a necessary contribution to the security of the algorithm. This is in contrast to algorithms such as DES which utilize many layers and depend on S-boxes that have no simple mathematical interpretation. A property called transparency is introduced to deal with the interaction of layers and how they must be selected to eliminate system weaknesses.
Utilizing this layered approach, a private key cryptographic algorithm consisting of three layers is constructed to demonstrate the design criteria. The algorithm has an adequate key space and valid keys can be easily generated. The design is based on a symmetrical layered configuration, which allows encryption and decryption to be performed using the same algorithm. The algorithm is suitable for VLSI implementation. Some statistical tests are applied to the algorithm in order that its cryptographic performance can be evaluated. The test results and attempts at cryptanalysis suggest that the three-layered algorithm is secure.
- Akl, S.G. and Meijer, H., “Two New Secret Key Encryption Algorithms”, presented at Eurocrypt’ 85, Linz, Austria, Apr. 1985.Google Scholar
- “Data Encryption Standard”, FIPS PUB 46, National Bureau of Standards, Washington, D.C., Jan. 1977.Google Scholar
- Davies, D.W., “Some Regular Properties of the DES”, Advances in Cryptology: Proceedings of Crypto’ 82, pp. 89–96, Plenum Press, 1983.Google Scholar
- Hellman, M.E., et al., “Results of an Initial Attempt to Cryptanalyze the NBS Data Encryption Standard”, Information Systems Lab., Dept. of Electrical Eng., Stanford Univ., 1976.Google Scholar
- Kabiski, B.S., Rivest, R.L. and Sherman, A.T., “Is the Data Encryption Standard a Group?”, presented at Eurocrypt’ 85, Linz, Austria, Apr. 1985.Google Scholar
- Leung, A.K. and Tavares, S.E., “Sequence Complexity as a Test for Cryptographic Systems”, Proceedings of Crypto’ 84, pp. 468–474, Springer-Verlag, 1985.Google Scholar
- Spencer, M.E. and Tavares, S.E., “Layered Broadcast Cryptographic Systems”, Advances in Cryptology: Proceedings of Crypto’ 83, pp. 157–170, Plenum Press, 1984.Google Scholar