Advanced

Optimum modulo 2m multidimensional transform diffusion in block ciphers

Massey, James L. LU (2003) IEEE International Symposium on Information Theory, 2003 In IEEE International Symposium on Information Theory - Proceedings p.253-253
Abstract
Linear transform structures as "diffusers" for iterative block ciphers of the substitution/linear-transformation type with symbols in Z<sub>2</sub>m, the ring of integers modulo 2<sup>m</sup> were considered. In such a cipher, encryption was accomplished by passing the plaintext input through a succession of "rounds". In each round, the round input was the first passed through a key-controlled substitution, which for each value of the round key relaizes a permutation on the space of plaintexts, and then passed through an unkeyed invertible linear transformation to yield the round output.
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Block ciphers, Invertible matrix, Linear transform structures, Pseudo-Hadamard transform
in
IEEE International Symposium on Information Theory - Proceedings
pages
253 - 253
publisher
IEEE--Institute of Electrical and Electronics Engineers Inc.
conference name
IEEE International Symposium on Information Theory, 2003
external identifiers
  • WOS:000186112600253
  • Other:CODEN: PISTFZ
DOI
10.1109/ISIT.2003.1228267
language
English
LU publication?
yes
id
636af70a-e4f1-4e32-b750-c35ece507dab (old id 612639)
date added to LUP
2007-11-30 14:22:42
date last changed
2016-06-27 13:26:07
@misc{636af70a-e4f1-4e32-b750-c35ece507dab,
  abstract     = {Linear transform structures as "diffusers" for iterative block ciphers of the substitution/linear-transformation type with symbols in Z&lt;sub&gt;2&lt;/sub&gt;m, the ring of integers modulo 2&lt;sup&gt;m&lt;/sup&gt; were considered. In such a cipher, encryption was accomplished by passing the plaintext input through a succession of "rounds". In each round, the round input was the first passed through a key-controlled substitution, which for each value of the round key relaizes a permutation on the space of plaintexts, and then passed through an unkeyed invertible linear transformation to yield the round output.},
  author       = {Massey, James L.},
  keyword      = {Block ciphers,Invertible matrix,Linear transform structures,Pseudo-Hadamard transform},
  language     = {eng},
  pages        = {253--253},
  publisher    = {ARRAY(0x8dd31a8)},
  series       = {IEEE International Symposium on Information Theory - Proceedings},
  title        = {Optimum modulo 2<sup>m</sup> multidimensional transform diffusion in block ciphers},
  url          = {http://dx.doi.org/10.1109/ISIT.2003.1228267},
  year         = {2003},
}