Back to Search
Start Over
On permutation operations in cipher design
- Source :
- ITCC (2)
- Publication Year :
- 2004
- Publisher :
- IEEE, 2004.
-
Abstract
- New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. We consider recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However, bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes.
Details
- Database :
- OpenAIRE
- Journal :
- International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
- Accession number :
- edsair.doi...........37641156fd50e5c19ad52602b5dcae70