Patent
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
Don Coppersmith,Rosario Gennaro,Shai Halevi,Charanjit S. Jutla,Stephen M. Matyas,Luke O'Connor,Mohammed Peyravian,David R. Safford,Nevenko Zunic +8 more
Reads0
Chats0
TLDR
In this article, a symmetric key block cipher with variable block sizes and key sizes is presented, as well as a variable number of rounds, where variable-length keys can be precomputed in some but not all stages.Abstract:
The present invention provides a technique, system, and computer program for a symmetric key block cipher. Variable block sizes and key sizes are supported, as well as a variable number of rounds. The cipher uses multiple stages of processing, where the stages have different structures and different subround functions, to provide excellent resistance to both linear and differential attacks. Feistel Type-1 and Type-3 are both used, each during different stages. The number of rounds may vary among stages. Subkeys are used in some, but not all, stages. The variable-length keys can be precomputed. A novel manner of using data-dependent rotation in a cipher is defined.read more
Citations
More filters
Patent
Circuit and method for implementing the advanced encryption standard block cipher algorithm in a system having a plurality of channels
Nhu-Ha Yup,Satish N. Anand +1 more
TL;DR: In this paper, the AES block cipher algorithm is implemented in a system having a plurality of channels and a single circuit for individually generating, on the fly, the round keys used during each round of AES block ciphers.
Patent
Cryptographic processing apparatus and cryptographic processing method, and computer program
Taizo Shirai,Kyoji Shibutani +1 more
TL;DR: In this article, the authors provided a highly secure cryptographic processing apparatus and method where an analysis difficulty is increased by increasing the minimum number (a robustness index against a differential attack in common key block encryption) of the active S box in the entire encryption function.
Patent
Encryption apparatus, decryption apparatus, expanded key generating apparatus and method therefor, and recording medium
TL;DR: Expanded key schedule circuit for common key encryption system in which expanded keys are used in a predetermined order in data randomizing process for encryption and in a reversed order for decryption, comprises round processing circuits connected in series as discussed by the authors.
Patent
Federated key management
TL;DR: In this paper, a system uses information submitted in connection with a request to determine if and how to process the request, where the information may include information that identifies a holder of a key needed for processing the request.
Patent
Variable-length cipher system and method
Clay Von Mueller,Mihir Bellare +1 more
TL;DR: In this paper, a variable block length cipher that returns the encrypted symbol set in the same format as the plaintext symbol set is presented, where the cipher can be based on DES, AES or other block ciphers.
References
More filters
Book ChapterDOI
Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)
TL;DR: Blowfish, a new secret-key block cipher, is proposed, a Feistel network, iterating a simple encryption function 16 times, which is very efficient on large microprocessors.
Book ChapterDOI
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses
TL;DR: In this paper, the authors constructed several block ciphers which have the following ideal properties: (1) the cipher is provably secure, (2) security of the cipher does not depend on any unproved hypotheses, (3) it can be easily implemented with current technology, and (4) all design criteria for the cipher are made public.
Patent
Block encryption algorithm with data-dependent rotations
TL;DR: A simple encryption and decryption device has been developed in this article, which is a fast block cipher that may be implemented efficiently in hardware or software, and makes heavy use of data-dependent rotations.
Patent
Method and system for machine enciphering and deciphering
TL;DR: In this article, variable length data words are processed segment-by-segment together with corresponding segments of an enciphering key and the result of the third cycle represents the enciphered data word.