Back to Search Start Over

On permutation operations in cipher design

Authors :
Matthew John Barton Robshaw
Yiqun Lisa Yin
Ruby B. Lee
Ronald L. Rivest
Zhijie Shi
Source :
ITCC (2)
Publication Year :
2004
Publisher :
IEEE, 2004.

Abstract

New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. We consider recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However, bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes.

Details

Database :
OpenAIRE
Journal :
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
Accession number :
edsair.doi...........37641156fd50e5c19ad52602b5dcae70