Data-driven Block Ciphers Fast Tel
商品資訊
ISBN13:9781420054118
出版社:CRC Press UK
作者:Moldovyan
出版日:2008/01/14
裝訂/頁數:平裝/208頁
定價
:NT$ 8450 元若需訂購本書,請電洽客服 02-25006600[分機130、131]。
無法訂購
商品簡介
目次
商品簡介
The Most Progressive and Complete Guide to DDO-Based Ciphers Developers have long recognized that ciphers based on Permutation Networks (PNs) and Controlled Substitution-Permutation Networks (CSPNs) allow for the implementation of a variety of Data Driven Operations (DDOs). These DDOs can provide fast encryption without incurring excessive hardware costs in modern telecommunication networks. However, until now, with a few exceptions, most DDO-based ciphers have been poorly represented in available literature and have continued to remain known to only a small number of encryption experts. In Data-Driven Block Ciphers for Fast Telecommunication Systems, Nikolai Moldovyan and Alexander Moldovyan, major innovators and holders of several dozen international patents in encryption technology, provide the background and detail the applications needed to investigate new properties of PNs especially relevant to the improvement of modern wireless systems.Furthermore, they propose a universal architecture involving controlled bit permutation instruction that will permit the performance of both data-driven permutations and an arbitrary prescribed fixed permutation in a single cycle. Immediately improved efficiency for current and future fast telecommunication systems and mobile networks Because of its simplicity and efficient use of current hardware, the embedding of this architecture is a highly attractive option for CPU manufacturers.By detailing all the relevant information into a single volume for the first time, the authors of this book make that option more feasible than ever before.
目次
Preface Acknowledgments Introduction About the Authors Abbreviations Notations Used in the Book Short Introduction to Cryptography 1.1 Symmetric Cryptosystems 1.1.1 Basic Notions 1.1.2 Additive Ciphers 1.1.3 Application in Telecommunications and Computer Systems 1.1.4 Block Ciphers 1.1.5 Controlled Operations as a Cryptographic Primitive 1.1.6 Construction Scheme Variants of Iterated Ciphers Based on Data-Dependent Operations 2 Permutation Networks as Primitive of Data-Driven Ciphers 2.1 Design of the Permutation Networks 2.2 Linear Characteristics of the Controlled Permutations 2.3 Differential Characteristics 0 2.4 Cobra-H64: A 64-Bit Block Cipher Based on Variable Permutations 2.4.1 Specification of the Encryption Algorithm 2.4.1 Security Estimation 2.5 DDP-64: Pure DDP-Based Cipher 2.5.1 Description of the Encryption Algorithm 2.5.2 Security Estimation 2.6 Conclusions 3 Data-Driven Primitives and Ciphers.Based on Controlled Substitution–Permutation Networks 3.1 Advanced DDP-Like Primitives and Their Classification 3.1.1 Elementary Controlled Substitutions 3.1.2 Classification of the F2/1 Boxes 3.1.3 Subset of the U2/1 Boxes with One Linear Output 3.2 Controlled Elements Suitable to Field Programmable Gate Array (FPGA) Implementation 3.3 Symmetric Topologies 3.4 Properties of the CSPNs Based on Elements F2/1 and F2/2 3.4.1 Nonlinearity and Avalanche Properties of the DDP-Like Boxes 90 3.4.2 Using the Generating Functions 3.5 Data-Driven Ciphers Based on CSPNs 3.5.1 Block Cipher Eagle-128 3.5.2 DDO-64: A DDO-Based Cipher with 64-Bit Data Block 3.5.3 Updating the Known DDP-Based Ciphers 3.6 Conclusions 4 Switchable.Data-Dependent.Operations 4.1 Representation of the CP Boxes as a Set of Pairs of Mutually Inverse Modifications 4.1.1 Topologies of the First Order 4.1.2 Topologies of the Higher Orders 4.2 Reversible DDO Boxes 4.2.1 SDDO Boxes with Symmetric Topology 4.2.2 Hardware Effi cient SDDOs 4.2.3 General Design of the SDDO Boxes of Different Orders 0 4.2.4 The RCO Design Based on CE with Mutual Inverse Modifications 4.3 Block Ciphers with Switchable DDOs 4.3.1 Updating the DDP-Based Block Ciphers 4.3.2 Hawk-64: A Cipher Based on Switchable Data-Driven Operations 4.4 Designs of the Bit Permutation Instruction for General Purpose Processors 4.4.1 Design of the BPI for Cryptographic Applications 4.4.2 Design of the BPI for Non-Cryptographic Applications 4.4.3 Architecture of the Universal BPI 4.5 Hardware Implementation Estimation of the Data-Driven Ciphers 4.5.1 Hardware Implementation Approaches and Architectures 4.5.2 Hardware Implementations of the DDP-Based Ciphers 4.5.3 Hardware Implementations of the DDO-Based Ciphers 4.5.4 Hardware Implementation Estimations of the Ciphers Based on Switchable DDOs 4.5.5 Hardware Implementation Effi cacy Comparison 4.6 On-Fly Expansion of the Secret Key 4.7 Conclusions 5 Data-Driven.Ciphers.Suitable.for.Software.Implementation 5.1 A Class of Ciphers Based on Data-Dependent Subkey Selection .7 5.2 Flexible Software Encryption Systems 5.3 Examples of Algorithm Realization 5.3.1 Flexible 128-Bit Cipher (d = • = 8; b = 32; w = 4) 5.3.2 The DDSS-Based Cipher with 64-Bit Input Data Block (d = • = 8; b = 32; w = 2) 5.3.3 The DDSS-Based Cipher with 128-Bit Input Data Block (d = • = 8; b = 32; w = 4) 5.4 General Characterization of the DDSS-Based Algorithms 5.5 Advanced DDSS-Based Ciphers 5.5.1 Algorithm 1: DDSS-Based Cipher with Fixed Operations 5.5.2 Algorithm 2: Flexible Advanced DDSS-Based Cipher 5.6 A Model for Security Estimation 5.7 A DDSS-Based Cipher with Flexible Input Data Block Size 5.7.1 Design Criteria 5.7.2 Local Notations 5.7.3 Transformation Algorithms 5.8 Conclusions References Index
主題書展
更多
主題書展
更多書展購物須知
外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。
無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。
為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。
若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

