scispace - formally typeset
Patent

Encryption device, encryption method, and computer program

TLDR
In this article, the authors proposed a high-security cryptographic processing apparatus that increases difficulty in analyzing the key of a common-key-block cipher, and a method therefor, to realize cryptographic processing whereby resistance to linear cryptanalysis attacks in the Common-Key-Block cipher is improved.
Abstract
The invention realizes a high-security cryptographic processing apparatus that increases difficulty in analyzing its key and a method therefor. In Feistel-type common-key-block cryptographic processing that repeatedly executes an SPN-type F-function having the nonlinear conversion section and the linear conversion section over a plurality of rounds, Linear conversion processing of an F-function corresponding to each of the plurality of rounds is carried out by linear conversion processing that applies square MDS (Maximum Distance Separable) matrices. The invention uses a setting that arbitrary m column vectors included in inverse matrices of square MDS matrices being set up at least in consecutive even-numbered rounds and in consecutive odd-numbered rounds, respectively, constitute a square MDS matrix. This structure realizes cryptographic processing whereby resistance to linear cryptanalysis attacks in the common-key-block cipher is improved.

read more

Citations
More filters
Patent

Cryptographic processing apparatus and cryptographic processing method, and computer program

TL;DR: In this article, the authors provided a highly secure cryptographic processing apparatus and method where an analysis difficulty is increased by increasing the minimum number (a robustness index against a differential attack in common key block encryption) of the active S box in the entire encryption function.
Patent

Encryption processing device, encryption processing method, and program

TL;DR: An encryption processing device including an encryption processing part configured to divide configuration bits of data to be data processed into plural lines and to input, and to repeatedly execute data conversion processing applying a round function to each line of data as a round calculation as discussed by the authors.
Patent

Systems and methods of source software code obfuscation

TL;DR: In this article, a data transformation is applied to one or more value representations in the computer-executable instructions to create code segments, the data transformation comprising at least one of a nonlinear transformation and a function composition transformation.
Patent

Encryption method and encryption device

Zhang Ming
TL;DR: In this paper, an encryption method and an encryption apparatus are described, which consists of generating an AES initial key by using an SAES encryption algorithm, and expanding the AES initialization key to obtain an AES encryption key; and encrypting information to be encrypted by using the AES encryption encryption key according to an AES algorithm to generate encrypted data.
Patent

Cryptographic processing apparatus, cryptographic-processing-algorithm constructing method, and cryptographic processing method, and computer program

TL;DR: In this article, a common-key block cipher based on the DSM with a high resistance to linear analysis and differential analysis is realized, where a plurality of different matrices satisfying a condition in which a minimum number of branches for all of the data lines is equal to or more than a predetermined value are selected as the matrices, each of the minimum numbers of branches corresponding to the lines being based on linear transformation matrices included in F-functions that are input to a corresponding data line in the extended Feistel structure.
References
More filters

MARS - a candidate cipher for AES

TL;DR: MARS is designed to take advantage of the powerful operations supported in today’s computers, resulting in a much improved security/performance tradeoff over existing ciphers, and offers better security than triple DES while running significantly faster than single DES.
Book ChapterDOI

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses

TL;DR: In this paper, the authors constructed several block ciphers which have the following ideal properties: (1) the cipher is provably secure, (2) security of the cipher does not depend on any unproved hypotheses, (3) it can be easily implemented with current technology, and (4) all design criteria for the cipher are made public.
Patent

Method and apparatus for data encryption

TL;DR: In this paper, a method and apparatus for encrypting and decrypting data which operates efficiently on computers of differing architectures is disclosed, which uses part of the data input to access a table of pseudo-random numbers.
Patent

Enhanced block ciphers with data-dependent rotations

TL;DR: A plaintext message to be encrypted is segmented into a number of words, and an integer multiplication function is applied to a subset of the words, e.g., to the two words in registers B and D as mentioned in this paper.
Journal ArticleDOI

Constructing Symmetric Ciphers Using the CAST Design Procedure

TL;DR: The CAST design procedure for constructing a family of DES-like Substitution-Permutation Network (SPN) cryptosystems is described in this paper, which appears to have good resistance to differential cryptanalysis, linear cryptanalysis and related-key cryptanalysis.
Related Papers (5)