A Layered Broadcast Cryptographic System

  • M. E. Spencer
  • S. E. Tavares


A new type of cryptosystem is presented that may find application in broadcast communication networks and database systems. To date, all proposals for such systems have either been shown to be weak under cryptanalytic attack or to possess undesirable characteristics such as data expansion. The new scheme is a layered system that is a concatenation of SP-networks and Hill broadcast encryption and is referred to as an SP-Hill cryptosystem. Tests carried out on it indicate that the scheme performs well cryptographically.


Encryption Algorithm Pseudorandom Sequence Broadcast Channel Data Encryption Standard Data Expansion 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    Davida, G.I., Wells, D.L. and Kam, J.B., “A Database System with Subkeys”, ACM Trans. on Data-base Systems, Vol. 6, Jun. 1981, pp. 312–328.CrossRefGoogle Scholar
  2. [2]
    Even, S. and Goldreich, O., “On the power of cascade ciphers”, presented at CRYPTO 83, Santa Barbara, CA, Aug. 22–24, 1983.Google Scholar
  3. [3]
    Feistel, H., “Cryptography and Computer Privacy”, Sci. American, Vol. 228, May 1973, pp. 15–23.CrossRefGoogle Scholar
  4. [4]
    Hellman, M.E., “Another Cryptanalytic Attack on ‘A Cryptosystem for Multiple Communication’”, Info. Proc. Lett., Vol. 12, Aug. 1981, pp. 182–183CrossRefGoogle Scholar
  5. [5]
    Kam, J.B. and Davida, G.I., “Structural Design of Substitution-Permutation Encryption Networks”, IEEE Trans. on Computers, Vol. C-28, Oct. 1979, pp. 747–753.CrossRefGoogle Scholar
  6. [6]
    Konheim, A.G., “Cryptography: A Primer”, John Wiley and Sons, New York, 1981.Google Scholar
  7. [7]
    Lee, L.N. and Lu, S.C., “A Multiple-destination Cryptosystem for Broadcast Channels”, COMSAT Tech. Review, Vol. 9, 1979, pp. 25–35.Google Scholar
  8. [8]
    Lempel, A. and Ziv, J., “On the Complexity of Finite Sequences”. IEEE Trans. on Info. Theory, Vol. IT-22, Jan. 1976, pp. 75–81.CrossRefGoogle Scholar
  9. [9]
    Luccio, F. and Mazzone, S., “A Cryptosystem for Multiple Communication”, Info. Proc. Lett., Vol. 10, Jul. 1981, pp. 180–183.CrossRefGoogle Scholar
  10. [10]
    Meijer, H., A Note on “A Cryptosystem for Multiple Communication”, Info. Proc. Lett., Vol. 12, 1981, pp. 179–181.CrossRefGoogle Scholar
  11. [11]
    National Bureau of Standards (US), “The Data Encryption Standard”, Federal Info. Proc. Standards Publ. FIPS PUB 46, Nat. Tech. Info. Service, Springfield, VA., 1977.Google Scholar
  12. [12]
    Papoulis, A., Probability, Random Variables, and Stochastic Processes, McGraw-Hill, 1965.Google Scholar
  13. [13]
    Shannon, C.E., “Communication Theory of Secrecy Systems”, Bell Syst. Tech. J., Vol. 28, Oct. 1949, pp. 656–715.Google Scholar
  14. [14]
    Spencer, M.E. and Tavares, S.E., “Layered Multi-User Cryptosystems”, IEEE Canadian Commun. and Energy Conf., Oct. 1982, Proc. pp. 379–382.Google Scholar
  15. [15]
    Spencer, M.E., “Layered Broadcast Cryptosystems”, M.Sc. Thesis, Dept. of Elec. Eng., Queen’s University, Kingston, Ont., Apr. 1983.Google Scholar

Copyright information

© Plenum Press, New York 1984

Authors and Affiliations

  • M. E. Spencer
    • 1
  • S. E. Tavares
    • 1
  1. 1.Department of Electrical EngineeringQueen’s UniversityKingstonCanada

Personalised recommendations