A Key-dependent Cipher DSDP

被引:0
|
作者
Chen, Like [1 ]
Zhang, Runtong [1 ]
机构
[1] Dalian Maritime Univ, Coll Informat Sci & Technol, Dalian 116026, Liaoning, Peoples R China
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Block ciphers based on key-dependent cipher structures have been investigated for years, however, their overall performance in terms of security and key-setup speed has not been sufficiently addressed. In this paper, we propose a 128-bit block cipher based on a novel SPN structure, which uses both S-box and P-boxes that are all key-dependent. With these two key-dependent transformations, the internal structure of this cipher algorithm is hided from the cryptanalyst, so as to resist the linear and differential cryptanalysis in a few round encryptions. We named this key-dependent structure the DSDP structure, and the cipher DSDP. A fast permutation algorithm is used to generate both the key-dependent S-box and key-dependent P-boxes. This greatly compensates the performance penalty of complex key schedule. The experimental results show that our algorithm has a very fast encryption/decryption speed and a reasonable fast key scheduling implementation.
引用
收藏
页码:310 / 313
页数:4
相关论文
共 50 条
  • [31] SECURITY OF SIGNATURE SCHEMES IN THE PRESENCE OF KEY-DEPENDENT MESSAGES
    Muniz, Madeline Gonzalez
    Steinwandt, Rainer
    CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 15 - +
  • [32] Designing key-dependent chaotic S-box with larger key space
    Yin, Ruming
    Yuan, Jian
    Wang, Jian
    Shan, Xiuming
    Wang, Xiqin
    CHAOS SOLITONS & FRACTALS, 2009, 42 (04) : 2582 - 2589
  • [33] Robust digital watermarking based on key-dependent basis functions
    Fridrich, J
    Baldoza, AC
    Simard, RJ
    INFORMATION HIDING, 1998, 1525 : 143 - 157
  • [34] Key-dependent random image transforms and their applications in image watermarking
    Fridrich, J
    INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS, AND TECHNOLOGY, PROCEEDINGS, 1999, : 237 - 243
  • [35] P-recursive Sequence and key-dependent Multimedia Scrambling
    Zhou, Yicong
    Panetta, Karen
    Agaian, Sos
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2008, 2008, 6982
  • [36] Encryption-scheme security in the presence of key-dependent messages
    Black, J
    Rogaway, P
    Shrimpton, T
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 62 - 75
  • [37] Security of message authentication codes in the presence of key-dependent messages
    Madeline González Muñiz
    Rainer Steinwandt
    Designs, Codes and Cryptography, 2012, 64 : 161 - 169
  • [38] Security of message authentication codes in the presence of key-dependent messages
    Muniz, Madeline Gonzalez
    Steinwandt, Rainer
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 161 - 169
  • [39] Construction of high quality key-dependent S-boxes
    Ao, Tianyong
    Rao, Jinli
    Dai, Kui
    Zou, Xuecheng
    IAENG International Journal of Computer Science, 2017, 44 (03): : 337 - 344
  • [40] Key-dependent side-channel cube attack on CRAFT
    Pang, Kok-An
    Abdul-Latip, Shekh Faisal
    ETRI JOURNAL, 2021, 43 (02) : 344 - 356