Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

Optimum modulo 2m multidimensional transform diffusion in block ciphers

Massey, James L. LU (2003) IEEE International Symposium on Information Theory, 2003 p.253-253
Abstract
Linear transform structures as "diffusers" for iterative block ciphers of the substitution/linear-transformation type with symbols in Z<sub>2</sub>m, the ring of integers modulo 2<sup>m</sup> were considered. In such a cipher, encryption was accomplished by passing the plaintext input through a succession of "rounds". In each round, the round input was the first passed through a key-controlled substitution, which for each value of the round key relaizes a permutation on the space of plaintexts, and then passed through an unkeyed invertible linear transformation to yield the round output.
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Block ciphers, Invertible matrix, Linear transform structures, Pseudo-Hadamard transform
host publication
IEEE International Symposium on Information Theory - Proceedings
pages
253 - 253
publisher
IEEE - Institute of Electrical and Electronics Engineers Inc.
conference name
IEEE International Symposium on Information Theory, 2003
conference location
Yokohama, Japan
conference dates
2003-06-29 - 2003-07-04
external identifiers
  • wos:000186112600253
  • other:CODEN: PISTFZ
DOI
10.1109/ISIT.2003.1228267
language
English
LU publication?
yes
id
636af70a-e4f1-4e32-b750-c35ece507dab (old id 612639)
date added to LUP
2016-04-04 12:22:42
date last changed
2018-11-21 21:10:35
@inproceedings{636af70a-e4f1-4e32-b750-c35ece507dab,
  abstract     = {{Linear transform structures as "diffusers" for iterative block ciphers of the substitution/linear-transformation type with symbols in Z&lt;sub&gt;2&lt;/sub&gt;m, the ring of integers modulo 2&lt;sup&gt;m&lt;/sup&gt; were considered. In such a cipher, encryption was accomplished by passing the plaintext input through a succession of "rounds". In each round, the round input was the first passed through a key-controlled substitution, which for each value of the round key relaizes a permutation on the space of plaintexts, and then passed through an unkeyed invertible linear transformation to yield the round output.}},
  author       = {{Massey, James L.}},
  booktitle    = {{IEEE International Symposium on Information Theory - Proceedings}},
  keywords     = {{Block ciphers; Invertible matrix; Linear transform structures; Pseudo-Hadamard transform}},
  language     = {{eng}},
  pages        = {{253--253}},
  publisher    = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}},
  title        = {{Optimum modulo 2<sup>m</sup> multidimensional transform diffusion in block ciphers}},
  url          = {{http://dx.doi.org/10.1109/ISIT.2003.1228267}},
  doi          = {{10.1109/ISIT.2003.1228267}},
  year         = {{2003}},
}