Data-driven Block Ciphers for Fast Telecommunication Systems

Data-driven Block Ciphers for Fast Telecommunication Systems

Free Standard Shipping

Purchasing Options

$129.95 $103.96
ISBN 9781420054118
Cat# AU5411
Add to cart
SAVE 20%
eBook (VitalSource)
$129.95 $90.97
ISBN 9781420054125
Cat# AUE5411
Add to cart
SAVE 30%
eBook Rentals
Other eBook Options:


  • Presents the history of data-driven operation boxes
  • Considers various topologies of CSPNs
  • Examines novel primitive—switchable data-driven operations implemented with CSPNs
  • Discusses fast software suitable ciphers based on a data-dependent subkey selection, which can be efficiently implemented using standard instructions for currently available processors
  • Provides a universal architecture for controlled bit permutation instruction
  • Summary

    The Most Progressive and Complete Guide to DDO-Based Ciphers

    Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts.

    In Data-Driven Block Ciphers for Fast Telecommunication Systems, Nikolai Moldovyan and Alexander Moldovyan, major innovators and holders of several dozen international patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems.Furthermore, they propose a universal architecture involving controlled bit permutation instruction that will permit the performance of both data-driven permutations and an arbitrary prescribed fixed permutation in a single cycle.

    Immediately improved efficiency for current and future fast telecommunication systems and mobile networks

    Because of its simplicity and efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers.By detailing all the relevant information into a single volume for the first time, the authors of this book make that option more feasible than ever before.

    Table of Contents

    About the Authors
    Notations Used in the Book
    Short Introduction to Cryptography
    1.1 Symmetric Cryptosystems
    1.1.1 Basic Notions
    1.1.2 Additive Ciphers
    1.1.3 Application in Telecommunications and Computer Systems
    1.1.4 Block Ciphers
    1.1.5 Controlled Operations as a Cryptographic Primitive
    1.1.6 Construction Scheme Variants of Iterated Ciphers Based on Data-Dependent Operations
    2 Permutation Networks as Primitive of Data-Driven Ciphers
    2.1 Design of the Permutation Networks
    2.2 Linear Characteristics of the Controlled Permutations
    2.3 Differential Characteristics 0
    2.4 Cobra-H64: A 64-Bit Block Cipher Based on Variable Permutations
    2.4.1 Specification of the Encryption Algorithm
    2.4.1 Security Estimation
    2.5 DDP-64: Pure DDP-Based Cipher
    2.5.1 Description of the Encryption Algorithm
    2.5.2 Security Estimation
    2.6 Conclusions
    3 Data-Driven Primitives and Ciphers.Based on Controlled
    Substitution–Permutation Networks
    3.1 Advanced DDP-Like Primitives and Their Classification
    3.1.1 Elementary Controlled Substitutions
    3.1.2 Classification of the F2/1 Boxes
    3.1.3 Subset of the U2/1 Boxes with One Linear Output
    3.2 Controlled Elements Suitable to Field Programmable Gate Array
    (FPGA) Implementation
    3.3 Symmetric Topologies
    3.4 Properties of the CSPNs Based on Elements F2/1 and F2/2
    3.4.1 Nonlinearity and Avalanche Properties of the DDP-Like
    Boxes  90
    3.4.2 Using the Generating Functions
    3.5 Data-Driven Ciphers Based on CSPNs
    3.5.1 Block Cipher Eagle-128
    3.5.2 DDO-64: A DDO-Based Cipher with 64-Bit Data Block
    3.5.3 Updating the Known DDP-Based Ciphers
    3.6 Conclusions
    4 Switchable.Data-Dependent.Operations
    4.1 Representation of the CP Boxes as a Set of Pairs of Mutually Inverse Modifications
    4.1.1 Topologies of the First Order
    4.1.2 Topologies of the Higher Orders
    4.2 Reversible DDO Boxes
    4.2.1 SDDO Boxes with Symmetric Topology
    4.2.2 Hardware Effi cient SDDOs
    4.2.3 General Design of the SDDO Boxes of Different Orders 0
    4.2.4 The RCO Design Based on CE with Mutual Inverse Modifications
    4.3 Block Ciphers with Switchable DDOs
    4.3.1 Updating the DDP-Based Block Ciphers
    4.3.2 Hawk-64: A Cipher Based on Switchable Data-Driven Operations
    4.4 Designs of the Bit Permutation Instruction for General Purpose Processors
    4.4.1 Design of the BPI for Cryptographic Applications
    4.4.2 Design of the BPI for Non-Cryptographic Applications
    4.4.3 Architecture of the Universal BPI
    4.5 Hardware Implementation Estimation of the Data-Driven Ciphers
    4.5.1 Hardware Implementation Approaches and Architectures
    4.5.2 Hardware Implementations of the DDP-Based Ciphers
    4.5.3 Hardware Implementations of the DDO-Based Ciphers
    4.5.4 Hardware Implementation Estimations of the Ciphers Based on Switchable DDOs
    4.5.5 Hardware Implementation Effi cacy Comparison
    4.6 On-Fly Expansion of the Secret Key
    4.7 Conclusions
    5 Data-Driven.Ciphers.Suitable.for.Software.Implementation
    5.1 A Class of Ciphers Based on Data-Dependent Subkey Selection .7
    5.2 Flexible Software Encryption Systems
    5.3 Examples of Algorithm Realization
    5.3.1 Flexible 128-Bit Cipher (d = • = 8; b = 32; w = 4)
    5.3.2 The DDSS-Based Cipher with 64-Bit Input Data Block (d = • = 8; b = 32; w = 2)
    5.3.3 The DDSS-Based Cipher with 128-Bit Input Data Block (d = • = 8; b = 32; w = 4)
    5.4 General Characterization of the DDSS-Based Algorithms
    5.5 Advanced DDSS-Based Ciphers
    5.5.1 Algorithm 1: DDSS-Based Cipher with Fixed Operations
    5.5.2 Algorithm 2: Flexible Advanced DDSS-Based Cipher
    5.6 A Model for Security Estimation
    5.7 A DDSS-Based Cipher with Flexible Input Data Block Size
    5.7.1 Design Criteria
    5.7.2 Local Notations
    5.7.3 Transformation Algorithms
    5.8 Conclusions

    Other CRC Press Sites
    Featured Authors
    Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press Pinterest Page for CRC Press
    Sign Up for Email Alerts
    © 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us