Up to 2 WeeksUsually despatched within 2 weeks
The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts. In Data-Driven Block Ciphers for Fast Telecommunication Systems, Nikolai Moldovyan and Alexander Moldovyan, major innovators and holders of several dozen international patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems.Furthermore, they propose a universal architecture involving controlled bit permutation instruction that will permit the performance of both data-driven permutations and an arbitrary prescribed fixed permutation in a single cycle. Immediately improved efficiency for current and future fast telecommunication systems and mobile networks Because of its simplicity and efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers.By detailing all the relevant information into a single volume for the first time, the authors of this book make that option more feasible than ever before.
Preface Acknowledgments Introduction About the Authors Abbreviations Notations Used in the Book Short Introduction to Cryptography 1.1 Symmetric Cryptosystems 1.1.1 Basic Notions 1.1.2 Additive Ciphers 1.1.3 Application in Telecommunications and Computer Systems 1.1.4 Block Ciphers 1.1.5 Controlled Operations as a Cryptographic Primitive 1.1.6 Construction Scheme Variants of Iterated Ciphers Based on Data-Dependent Operations 2 Permutation Networks as Primitive of Data-Driven Ciphers 2.1 Design of the Permutation Networks 2.2 Linear Characteristics of the Controlled Permutations 2.3 Differential Characteristics 0 2.4 Cobra-H64: A 64-Bit Block Cipher Based on Variable Permutations 2.4.1 Specification of the Encryption Algorithm 2.4.1 Security Estimation 2.5 DDP-64: Pure DDP-Based Cipher 2.5.1 Description of the Encryption Algorithm 2.5.2 Security Estimation 2.6 Conclusions 3 Data-Driven Primitives and Ciphers.Based on Controlled Substitution-Permutation Networks 3.1 Advanced DDP-Like Primitives and Their Classification 3.1.1 Elementary Controlled Substitutions 3.1.2 Classification of the F2/1 Boxes 3.1.3 Subset of the U2/1 Boxes with One Linear Output 3.2 Controlled Elements Suitable to Field Programmable Gate Array (FPGA) Implementation 3.3 Symmetric Topologies 3.4 Properties of the CSPNs Based on Elements F2/1 and F2/2 3.4.1 Nonlinearity and Avalanche Properties of the DDP-Like Boxes 90 3.4.2 Using the Generating Functions 3.5 Data-Driven Ciphers Based on CSPNs 3.5.1 Block Cipher Eagle-128 3.5.2 DDO-64: A DDO-Based Cipher with 64-Bit Data Block 3.5.3 Updating the Known DDP-Based Ciphers 3.6 Conclusions 4 Switchable.Data-Dependent.Operations 4.1 Representation of the CP Boxes as a Set of Pairs of Mutually Inverse Modifications 4.1.1 Topologies of the First Order 4.1.2 Topologies of the Higher Orders 4.2 Reversible DDO Boxes 4.2.1 SDDO Boxes with Symmetric Topology 4.2.2 Hardware Effi cient SDDOs 4.2.3 General Design of the SDDO Boxes of Different Orders 0 4.2.4 The RCO Design Based on CE with Mutual Inverse Modifications 4.3 Block Ciphers with Switchable DDOs 4.3.1 Updating the DDP-Based Block Ciphers 4.3.2 Hawk-64: A Cipher Based on Switchable Data-Driven Operations 4.4 Designs of the Bit Permutation Instruction for General Purpose Processors 4.4.1 Design of the BPI for Cryptographic Applications 4.4.2 Design of the BPI for Non-Cryptographic Applications 4.4.3 Architecture of the Universal BPI 4.5 Hardware Implementation Estimation of the Data-Driven Ciphers 4.5.1 Hardware Implementation Approaches and Architectures 4.5.2 Hardware Implementations of the DDP-Based Ciphers 4.5.3 Hardware Implementations of the DDO-Based Ciphers 4.5.4 Hardware Implementation Estimations of the Ciphers Based on Switchable DDOs 4.5.5 Hardware Implementation Effi cacy Comparison 4.6 On-Fly Expansion of the Secret Key 4.7 Conclusions 5 Data-Driven.Ciphers.Suitable.for.Software.Implementation 5.1 A Class of Ciphers Based on Data-Dependent Subkey Selection .7 5.2 Flexible Software Encryption Systems 5.3 Examples of Algorithm Realization 5.3.1 Flexible 128-Bit Cipher (d = * = 8; b = 32; w = 4) 5.3.2 The DDSS-Based Cipher with 64-Bit Input Data Block (d = * = 8; b = 32; w = 2) 5.3.3 The DDSS-Based Cipher with 128-Bit Input Data Block (d = * = 8; b = 32; w = 4) 5.4 General Characterization of the DDSS-Based Algorithms 5.5 Advanced DDSS-Based Ciphers 5.5.1 Algorithm 1: DDSS-Based Cipher with Fixed Operations 5.5.2 Algorithm 2: Flexible Advanced DDSS-Based Cipher 5.6 A Model for Security Estimation 5.7 A DDSS-Based Cipher with Flexible Input Data Block Size 5.7.1 Design Criteria 5.7.2 Local Notations 5.7.3 Transformation Algorithms 5.8 Conclusions References Index
Number Of Pages:
- ID: 9781420054118
- Saver Delivery: Yes
- 1st Class Delivery: Yes
- Courier Delivery: Yes
- Store Delivery: Yes
Prices are for internet purchases only. Prices and availability in WHSmith Stores may vary significantly
© Copyright 2013 - 2018 WHSmith and its suppliers.
WHSmith High Street Limited Greenbridge Road, Swindon, Wiltshire, United Kingdom, SN3 3LD, VAT GB238 5548 36