Optimum modulo 2m multidimensional transform diffusion in block ciphers
(2003) IEEE International Symposium on Information Theory, 2003 p.253-253- Abstract
- Linear transform structures as "diffusers" for iterative block ciphers of the substitution/linear-transformation type with symbols in Z<sub>2</sub>m, the ring of integers modulo 2<sup>m</sup> were considered. In such a cipher, encryption was accomplished by passing the plaintext input through a succession of "rounds". In each round, the round input was the first passed through a key-controlled substitution, which for each value of the round key relaizes a permutation on the space of plaintexts, and then passed through an unkeyed invertible linear transformation to yield the round output.
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/612639
- author
- Massey, James L. LU
- organization
- publishing date
- 2003
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- keywords
- Block ciphers, Invertible matrix, Linear transform structures, Pseudo-Hadamard transform
- host publication
- IEEE International Symposium on Information Theory - Proceedings
- pages
- 253 - 253
- publisher
- IEEE - Institute of Electrical and Electronics Engineers Inc.
- conference name
- IEEE International Symposium on Information Theory, 2003
- conference location
- Yokohama, Japan
- conference dates
- 2003-06-29 - 2003-07-04
- external identifiers
-
- wos:000186112600253
- other:CODEN: PISTFZ
- DOI
- 10.1109/ISIT.2003.1228267
- language
- English
- LU publication?
- yes
- id
- 636af70a-e4f1-4e32-b750-c35ece507dab (old id 612639)
- date added to LUP
- 2016-04-04 12:22:42
- date last changed
- 2018-11-21 21:10:35
@inproceedings{636af70a-e4f1-4e32-b750-c35ece507dab, abstract = {{Linear transform structures as "diffusers" for iterative block ciphers of the substitution/linear-transformation type with symbols in Z<sub>2</sub>m, the ring of integers modulo 2<sup>m</sup> were considered. In such a cipher, encryption was accomplished by passing the plaintext input through a succession of "rounds". In each round, the round input was the first passed through a key-controlled substitution, which for each value of the round key relaizes a permutation on the space of plaintexts, and then passed through an unkeyed invertible linear transformation to yield the round output.}}, author = {{Massey, James L.}}, booktitle = {{IEEE International Symposium on Information Theory - Proceedings}}, keywords = {{Block ciphers; Invertible matrix; Linear transform structures; Pseudo-Hadamard transform}}, language = {{eng}}, pages = {{253--253}}, publisher = {{IEEE - Institute of Electrical and Electronics Engineers Inc.}}, title = {{Optimum modulo 2<sup>m</sup> multidimensional transform diffusion in block ciphers}}, url = {{http://dx.doi.org/10.1109/ISIT.2003.1228267}}, doi = {{10.1109/ISIT.2003.1228267}}, year = {{2003}}, }