scispace - formally typeset
Patent

Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks

Reads0
Chats0
TLDR
In this article, a symmetric key block cipher with variable block sizes and key sizes is presented, as well as a variable number of rounds, where variable-length keys can be precomputed in some but not all stages.
Abstract
The present invention provides a technique, system, and computer program for a symmetric key block cipher. Variable block sizes and key sizes are supported, as well as a variable number of rounds. The cipher uses multiple stages of processing, where the stages have different structures and different subround functions, to provide excellent resistance to both linear and differential attacks. Feistel Type-1 and Type-3 are both used, each during different stages. The number of rounds may vary among stages. Subkeys are used in some, but not all, stages. The variable-length keys can be precomputed. A novel manner of using data-dependent rotation in a cipher is defined.

read more

Citations
More filters
Patent

Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels

TL;DR: In this paper, the AES block cipher algorithm is implemented in a system having a plurality of channels and a single circuit for individually generating, on the fly, the round keys used during each round of AES block ciphers.
Patent

Cryptographic processing apparatus and cryptographic processing method, and computer program

TL;DR: In this article, the authors provided a highly secure cryptographic processing apparatus and method where an analysis difficulty is increased by increasing the minimum number (a robustness index against a differential attack in common key block encryption) of the active S box in the entire encryption function.
Patent

Encryption apparatus, decryption apparatus, expanded key generating apparatus and method therefor, and recording medium

TL;DR: Expanded key schedule circuit for common key encryption system in which expanded keys are used in a predetermined order in data randomizing process for encryption and in a reversed order for decryption, comprises round processing circuits connected in series as discussed by the authors.
Patent

Federated key management

TL;DR: In this paper, a system uses information submitted in connection with a request to determine if and how to process the request, where the information may include information that identifies a holder of a key needed for processing the request.
Patent

Variable-length cipher system and method

TL;DR: In this paper, a variable block length cipher that returns the encrypted symbol set in the same format as the plaintext symbol set is presented, where the cipher can be based on DES, AES or other block ciphers.
References
More filters
Book ChapterDOI

Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)

TL;DR: Blowfish, a new secret-key block cipher, is proposed, a Feistel network, iterating a simple encryption function 16 times, which is very efficient on large microprocessors.
Book ChapterDOI

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses

TL;DR: In this paper, the authors constructed several block ciphers which have the following ideal properties: (1) the cipher is provably secure, (2) security of the cipher does not depend on any unproved hypotheses, (3) it can be easily implemented with current technology, and (4) all design criteria for the cipher are made public.
Patent

Block encryption algorithm with data-dependent rotations

TL;DR: A simple encryption and decryption device has been developed in this article, which is a fast block cipher that may be implemented efficiently in hardware or software, and makes heavy use of data-dependent rotations.
Patent

Method and system for machine enciphering and deciphering

TL;DR: In this article, variable length data words are processed segment-by-segment together with corresponding segments of an enciphering key and the result of the third cycle represents the enciphered data word.