scispace - formally typeset
Search or ask a question
Topic

MDS matrix

About: MDS matrix is a research topic. Over the lifetime, 102 publications have been published within this topic receiving 2000 citations.


Papers
More filters
Patent
19 Jun 2020
TL;DR: In this paper, a novel high-security lightweight ECEG block cipher implementation method and system and a storage medium was proposed, key expansion is carried out based on an NP difficult problem of elliptic curve discrete logarithm, and the expansion enables a password attacker to be difficult to infer what an original key is even if the password attacker obtains a key of an intermediate round, so the security of the password is further improved.
Abstract: The invention provides a novel high-security lightweight ECEG block cipher implementation method and system and a storage medium. Key expansion is carried out based on an NP difficult problem of elliptic curve discrete logarithm, and the expansion enables a password attacker to be difficult to infer what an original key is even if the password attacker obtains a key of an intermediate round, so the security of the password is further improved, and the ECDLP is applied to the field of encryption and decryption of the block password for the first time; besides, the technical scheme of the invention further provides an extended generalized Feistel structure, which is different from a conventional Feistel structure, an MDS matrix is generated after four times of iteration, the MDS matrix mainly plays a diffusion role in the whole cryptographic algorithm, and the matrix is utilized to perform column obfuscation operation. The diffusion layer formed by the MDS matrix can optimally resist differential attacks and linear attacks, and the security of the algorithm in the technical scheme can be further improved when the diffusion layer is applied to the technical scheme of the invention.
01 Jan 2013
TL;DR: This paper introduces a new symmetric cryptosystem based on IDEA system that can encrypt blocks of plaintext of length 512 bits into blocks of the same length.
Abstract: The increasing ubiquity of information technologies in all aspects of human life makes security issues one of the most critical aspects of system design. In this paper we introduce a new symmetric cryptosystem based on IDEA system. The plaintext block is divided into basic sub-blocks each of thirty-two bits in length. The new Proposal can encrypt blocks of plaintext of length 512 bits into blocks of the same length. The key length is 1024 bits. The total number of rounds is 16. It uses modulo 32 2
Book ChapterDOI
04 Dec 2020
TL;DR: In this paper, a method for securing different types of images (binary, gray scale, true color and index) based on stream cipher (RC4A) and MDS (Maximum Distance Separable) matrix is proposed.
Abstract: Stream ciphers are extensively used over a wide range of applications including security of digital data. In this paper, a method for securing different types of images (binary, gray scale, true color and index) based on stream cipher (RC4A) and MDS (Maximum Distance Separable) matrix is proposed. The proposed scheme is based on the cryptographic Permutation-Substitution Network (PSN) and hence achieves Shannon’s confusion-diffusion characteristics required for a robust encryption algorithm. The scheme encrypts a digital image into a random-like image from human visual as well as statistical point of view. Several encryption evaluation metrics are applied on test images to empirically assess the performance and efficiency of the proposed method. The consequences of these statistical and security tests support the concreteness of the proposed approach.
Journal ArticleDOI
16 Sep 2021
TL;DR: In this article, a method for securing different types of images (binary, gray scale, true color, and index) based on stream cipher (RC4A) and MDS (Maximum Distance Separable) matrix is proposed.
Abstract: This is an improved and extended version of the paper presented in CVIP 2020 conference. Stream ciphers are extensively used over a wide range of applications including security of digital data. In this paper, a method for securing different types of images (binary, gray scale, true color, and index) based on stream cipher (RC4A) and MDS (Maximum Distance Separable) matrix is proposed. The method adopts the framework of the Permutation-Substitution Network (PSN) of cryptography, and thus satisfies both confusion and diffusion properties required for a secure encryption algorithm. The proposed method encrypts a digital image into a random-like image from human visual as well as statistical point of view. Several encryption evaluation metrics, such as key sensitivity, chi-squared test, adjacent pixels correlation coefficient, irregular deviation, number of pixel change rate, unified averaged changed intensity, etc., are applied on test images taken from MATLAB IPT and USC-SIPI image database, to empirically assess the performance of the proposed method. The results of these statistical and security tests support the robustness of the proposed approach.
Posted Content
TL;DR: In this article, the authors focus on the construction of a set of submatrices of a circulant matrix such that it is a smaller set to verify that the matrix is an MDS (maximum distance separable) one, comparing to the complete set of square sub-matrices needed in general case.
Abstract: The present paper focuses on the construction of a set of submatrices of a circulant matrix such that it is a smaller set to verify that the circulant matrix is an MDS (maximum distance separable) one, comparing to the complete set of square submatrices needed in general case. The general MDS verification method requires to test for singular submatrices: if at least one square submatrix is singular the matrix is not MDS. However, the complexity of the general method dramatically increases for matrices of a greater dimension. We develop an algorithm that constructs a smaller subset of submatrices thanks to a simple structure of circulant matrices. The algorithm proposed in the paper reduces the size of the testing set by approximately two matrix orders.
Network Information
Related Topics (5)
Cryptography
37.3K papers, 854.5K citations
77% related
Encryption
98.3K papers, 1.4M citations
75% related
Public-key cryptography
27.2K papers, 547.7K citations
74% related
Hash function
31.5K papers, 538.5K citations
71% related
Cryptographic protocol
11.7K papers, 268.8K citations
70% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20221
20217
20205
20198
201810
201716