On the Use of Interconnection Networks in Cryptography
نویسنده
چکیده
Cryptosystems can be viewed as sets of permutations from which one permutation is chosen as cryptofunction by specifying a key. Interconnection networks have been widely studied in the field of parallel processing. They have one property that makes them very interesting for cryptology, i.e. they give the opportunity to access and perform permutations at the same time. This paper presents two examples of how cryptology can benefit from the use of interconnection networks. One is a new construction of a pseudo-random permutation (generator) from one single pseudo-random function (generator). The search for such constructions has been of major interest since Luby and Rackoff gave the first construction in 1986. The second example presents a cryptosystem based on interconnection networks and a certain class of boolean functions. Some arguments for its security are given. Although there is a relation between the two examples they complement each other in using different properties of interconnection networks. This can be regarded as an argument that exploiting the full potential of interconnection networks can establish completely new techniques in cryptology.
منابع مشابه
Performance Analysis of a New Neural Network for Routing in Mesh Interconnection Networks
Routing is one of the basic parts of a message passing multiprocessor system. The routing procedure has a great impact on the efficiency of a system. Neural algorithms that are currently in use for computer networks require a large number of neurons. If a specific topology of a multiprocessor network is considered, the number of neurons can be reduced. In this paper a new recurrent neural ne...
متن کاملPerformance Analysis of a New Neural Network for Routing in Mesh Interconnection Networks
Routing is one of the basic parts of a message passing multiprocessor system. The routing procedure has a great impact on the efficiency of a system. Neural algorithms that are currently in use for computer networks require a large number of neurons. If a specific topology of a multiprocessor network is considered, the number of neurons can be reduced. In this paper a new recurrent neural ne...
متن کاملAn Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms
Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...
متن کاملThe Idea Of Using The Steganography As Encryption Tool
the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...
متن کاملToward an energy efficient PKC-based key management system for wireless sensor networks
Due to wireless nature and hostile environment, providing of security is a critical and vital task in wireless sensor networks (WSNs). It is known that key management is an integral part of a secure network. Unfortunately, in most of the previous methods, security is compromised in favor of reducing energy consumption. Consequently, they lack perfect resilience and are not fit for applications ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1991