A Key-dependent Cipher DSDP

被引:0
|
作者
Chen, Like [1 ]
Zhang, Runtong [1 ]
机构
[1] Dalian Maritime Univ, Coll Informat Sci & Technol, Dalian 116026, Liaoning, Peoples R China
关键词
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Block ciphers based on key-dependent cipher structures have been investigated for years, however, their overall performance in terms of security and key-setup speed has not been sufficiently addressed. In this paper, we propose a 128-bit block cipher based on a novel SPN structure, which uses both S-box and P-boxes that are all key-dependent. With these two key-dependent transformations, the internal structure of this cipher algorithm is hided from the cryptanalyst, so as to resist the linear and differential cryptanalysis in a few round encryptions. We named this key-dependent structure the DSDP structure, and the cipher DSDP. A fast permutation algorithm is used to generate both the key-dependent S-box and key-dependent P-boxes. This greatly compensates the performance penalty of complex key schedule. The experimental results show that our algorithm has a very fast encryption/decryption speed and a reasonable fast key scheduling implementation.
引用
收藏
页码:310 / 313
页数:4
相关论文
共 50 条
  • [41] Geometric-Invariant Image Watermarking by Key-Dependent Triangulation
    Hu, Shiyan
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 169 - 181
  • [42] Key-dependent pyramidal wavelet domains for secure watermark embedding
    Dietl, WM
    Meerwald, P
    Uhl, A
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 728 - 739
  • [43] New method of key-dependent message security for asymmetric encryption
    Lai, Qiqi
    Hu, Yupu
    Chen, Yuan
    Wang, Baocang
    Wang, Fenghe
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2157 - 2170
  • [44] Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
    Bellare, Mihir
    Keelveedhi, Sriram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 610 - 629
  • [45] Key Dependent Cipher Scheme for Sensor Networks
    Noura, Hassan
    Martin, Steven
    Al Agha, Khaldoun
    Grote, Walter
    2013 12TH ANNUAL MEDITERRANEAN AD HOC NETWORKING WORKSHOP (MED-HOC-NET 2013), 2013, : 148 - 154
  • [46] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
    Boehl, Florian
    Davies, Gareth T.
    Hofheinz, Dennis
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500
  • [47] Assessing JPEG2000 encryption with key-dependent wavelet packets
    Engel, Dominik
    Stuetz, Thomas
    Uhl, Andreas
    EURASIP JOURNAL ON INFORMATION SECURITY, 2012, 2012 (01)
  • [48] Construction of Key-dependent S-box for Secure Cloud Storage
    Indumathi, A.
    Sumathi, G.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1509 - 1524
  • [49] A Key-Dependent Secure Image Hashing Scheme by Using Radon Transform
    Ou, Yang
    Rhee, Kyung Hyune
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ISPACS 2009), 2009, : 595 - +
  • [50] AES Security Improvement by Utilizing New Key-Dependent XOR Tables
    Luong, Tran Thi
    Cuong, Nguyen Ngoc
    Vo, Bay
    IEEE ACCESS, 2024, 12 : 53158 - 53177