SCALABLE PP-1 BLOCK CIPHER

被引:7
|
作者
Bucholc, Krzysztof [1 ]
Chmiel, Krzysztof [1 ]
Grocholewska-Czurylo, Anna [1 ]
Idzikowska, Ewa [1 ]
Janicka-Lipska, Izabela [1 ]
Stoklosa, Janusz [1 ]
机构
[1] Poznan Univ Tech, Inst Control & Informat Engn, PL-60965 Poznan, Poland
关键词
symmetric cipher; scalable cipher; S-box construction; resistance against cryptanalysis; error detection;
D O I
10.2478/v10006-010-0030-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having very low memory requirements and using only simple and fast arithmetic operations, the cipher is aimed at platforms with limited resources, e. g., smartcards. At the core of the cipher's processing is a carefully designed S-box. The paper discusses in detail all aspects of PP-1 cipher design including S-box construction, permutation and round key scheduling. The quality of the PP-1 cipher is also evaluated with respect to linear cryptanalysis and other attacks. PP-1's concurrent error detection is also discussed. Some processing speed test results are given and compared with those of other ciphers.
引用
收藏
页码:401 / 411
页数:11
相关论文
共 50 条
  • [31] The block cipher Rijndael
    Daemen, J
    Rijmen, V
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 277 - 284
  • [32] Probabilistic Block Cipher
    Zbitnev, Nikita
    Shishlyannikov, Dmitry
    Gridin, Dmitry
    PROCEEDINGS OF THE 2018 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2018, : 603 - 606
  • [33] The block cipher BKSQ
    Daemen, J
    Rijmen, V
    SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 236 - 245
  • [34] What is the effective key length for a block cipher: an attack on every practical block cipher
    Huang JiaLin
    Lai XueJia
    SCIENCE CHINA-INFORMATION SCIENCES, 2014, 57 (07) : 1 - 11
  • [35] What is the effective key length for a block cipher: an attack on every practical block cipher
    HUANG JiaLin
    LAI XueJia
    ScienceChina(InformationSciences), 2014, 57 (07) : 138 - 148
  • [36] What is the effective key length for a block cipher: an attack on every practical block cipher
    JiaLin Huang
    XueJia Lai
    Science China Information Sciences, 2014, 57 : 1 - 11
  • [37] Compact Hardware Implementations of MISTY1 Block Cipher
    Yasir
    Wu, Ning
    Zhang, Xiaoqiang
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2018, 27 (03)
  • [38] Cryptanalysis of Magpie Block Cipher
    Huang, Jin-Jie
    Wang, Jian-Shan
    Dai, Wei
    Shen, Xuan
    He, Jun
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 717 - 721
  • [39] LBlock: A Lightweight Block Cipher
    Wu, Wenling
    Zhang, Lei
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 327 - 344
  • [40] Cryptanalysis of QTL Block Cipher
    Coban, Mustafa
    Karakoc, Ferhat
    Ozen, Mehmet
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 60 - 68