2002
DOI: 10.1007/s00145-001-0012-9
|View full text |Cite
|
Sign up to set email alerts
|

A cipher based on data-dependent permutations

Abstract: Data-dependent permutations (DDP) are introduced as basic cryptographic primitives to construct fast hardware-oriented ciphers. Some variants of the DDP operations and their application in the cipher CIKS-1 are considered. A feature of CIKS-1 is the use of both the data-dependent transformation of round subkeys and the keydependent DDP operations.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0

Year Published

2004
2004
2010
2010

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 46 publications
(36 citation statements)
references
References 6 publications
(7 reference statements)
0
36
0
Order By: Relevance
“…3 Such functions rely on data-dependent bit transpositions [16]. Given a bitstring x = x 2k · · · x 1 , fixed permutations σ 0 and σ 1 over the set {1, 2, .…”
Section: Introductionmentioning
confidence: 99%
“…3 Such functions rely on data-dependent bit transpositions [16]. Given a bitstring x = x 2k · · · x 1 , fixed permutations σ 0 and σ 1 over the set {1, 2, .…”
Section: Introductionmentioning
confidence: 99%
“…Further information on the structure of the datadependent permutations found in CIKS-1 can be found in [3].…”
Section: The Ciks-1 Data-dependent Permutationsmentioning
confidence: 99%
“…In the paper [3] the CIKS-1 authors make the claim that the number of plaintext pairs required for a differential attack on the cipher is in the order of 2 64 . This analysis is done by ignoring the internal key schedule and permutation P 1 and focusing on P 2 and P 6 (the P 32/80 permutations on the right hand side of the cipher).…”
Section: Analysis Of Differentialsmentioning
confidence: 99%
See 2 more Smart Citations