More efficient software implementations of (generalized) DES
نویسندگان
چکیده
By preserving the macro structure of the Data Encryption Standard (DES), but by allowing the user to choose 1. 16•48 independent key bits instead of generating them all using only 56 key bits, 2. arbitrary substitutions S1, ..., S8 and 3. arbitrary permutations IP and P, and 4. an arbitrary expanding permutation E, we obtain a very general and presumably much stronger cipher called generalized DES, or G-DES for short. A cipher having the first three extensions is called G-DES with non-arbitrary E. We choose, in an unorthodox way, from some well known equivalent representations of G-DES and some well suited table combinations and implementations. Concatenations of substitutions and permutations are precomputed and tabulated. Since direct tabulation of e.g. a permutation of 32 bits requires 232 entries of 4 bytes each, which clearly exceeds the main memories of today, the big table is split into smaller ones that permute disjoint and compact parts of the input bits at the appropriate positions. To compute an entry in the big table, the corresponding entries in the smaller tables are ORed. For some specific expanding permutations (including the original E in DES), the expense of this permutation can be reduced drastically: Only copy, rotate, and AND with a mask of a register is necessary, if the bits in the register and the tables of the substitutions are ordered appropriately. Since this is the only way to achieve better performance for DES than for G-DES we know, it does not seem to make sense to implement anything more narrow in software than G-DES with non-arbitrary E. __________________________ This is an extended and revised version of a paper presented at SECURICOM 90.
منابع مشابه
Efficient Hardware Implementations for the DES Family
Network data is, currently, often encrypted at a low level. In addition, as it is widely supported, the majority of future networks will use low-layer (IP level) encryption. Moreover, current trends imply that future networks are likely to be dominated by mobile terminals, thus, the power consumption and electromagnetic emissions aspects of encryption devices will be critical. This paper presen...
متن کاملConnected and Hyperconnected Generalized Topological Spaces
A. Csaszar introduced and extensively studied the notion of generalized open sets. Following Csazar, we introduce a new notion hyperconnected. We study some specic properties about connected and hyperconnected in generalized topological spaces. Finally, we characterize the connected component in generalized topological spaces.
متن کاملEfficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis
In its basic version, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, outputbits, and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are provided, this approximation can be used to assign probabilities to the possible keys and to locate the most probable one. In 1993, Matsui applied...
متن کاملHigh-Throughput and Area-Efficient FPGA Implementations of Data Encryption Standard (DES)
One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Automatic Teller Machines (ATM’s), smartcards, and mobile phone SIM cards. In this paper, we present area-efficient and high-throughput FPGA implementations of the DES which are develo...
متن کاملA White-Box DES Implementation for DRM Applications
For digital rights management (drm) software implementations incorporating cryptography, white-box cryptography (cryptographic implementation designed to withstand the white-box attack context) is more appropriate than traditional black-box cryptography. In the whitebox context, the attacker has total visibility into software implementation and execution. Our objective is to prevent extraction ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 12 شماره
صفحات -
تاریخ انتشار 1993