Conception of efficient key-dependent binary diffusion matrix structures for dynamic cryptographic algorithms

Journal of Information Security and Applications - Tập 76 - Trang 103514 - 2023
Hassan N. Noura1, Ola Salman2, Ali Chehab2
1Univ. Bourgogne Franche-Comté (UBFC), FEMTO-ST Institute, France
2American University of Beirut, Electrical and Computer Engineering Department, Beirut 1107 2020, Lebanon

Tài liệu tham khảo

Menezes, 1997 Stallings, 2017 Chou, 2018 Schneier, 1994, Description of a new variable-length key, 64-bit block cipher (blowfish), vol. 809, 191 Miller, 2009 Nakahara, 2009, A new involutory MDS matrix for the AES, Int J Netw Secur, 9, 109 Aoki, 2001, Camellia: A 128-bit block cipher suitable for multiple platforms - Design and analysis, LNCS, 2012, 39 Kwon, 2004, New block cipher: ARIA, vol. 2971, 432 Kwon, 2005, Design of block ciphers and coding theory, Trends Math, 8, 13 Koo, 2004, Constructing and cryptanalysis of a 16 × 16 binary matrix as a diffusion layer, vol. 2908, 489 Koo, 2006, On constructing of a 32 ×32 binary matrix as a diffusion layer for a 256-bit block cipher, vol. 4296, 51 Aslan, 2014, Algebraic construction of cryptographically good binary linear transformations, Secur Commun Netw, 7, 53, 10.1002/sec.556 Sakallı Muharrem Tolga, Akleylek Sedat, Aslan Bora, Bulus Ercan, Sakallı Fatma Büyüksaraçoglu. On the construction of 20 × 20 and 24 × 24 Binary matrices with good implementation properties for lightweight block ciphers and hash functions. Sakallı, 2014, On the construction of and binary matrices with good implementation properties for lightweight block ciphers and hash functions, Math Probl Eng, 2014, 10.1155/2014/540253 Noura, 2014, ERSS-RLNC: Efficient and robust secure scheme for random linear network coding, Comput Netw, 75, Part A, 99, 10.1016/j.comnet.2014.09.013 Noura, 2021 Dai A, Kim C, Kim J. Invertibility probability of binary matrices. Noura Hassan. Design and simulation of efficient chaos based generators, crypto-systems and hash functions. [Ph.D. thesis]. Noura Hassan, Martin Steven, Al Agha Khaldoun. E3SN - efficient security scheme for sensor networks. In: SECRYPT - 10th international conference on security and cryptography. Reykjavik, Iceland; 2013. Noura, 2021, LoRCA: Lightweight round block and stream cipher algorithms for IoV systems, Veh Commun Noura, 2019, Efficient and secure cipher scheme for multimedia contents, Multimedia Tools Appl, 78, 1, 10.1007/s11042-018-6845-0 Noura, 2018, Lightweight, dynamic and efficient image encryption scheme, Multimedia Tools Appl, 1 Noura, 2017, A new efficient lightweight and secure image cipher scheme, Multimedia Tools Appl, 1 Noura, 2019, Efficient & secure cipher scheme with dynamic key-dependent mode of operation, Signal Process, Image Commun, 78, 448, 10.1016/j.image.2019.08.005 Daemen, 2002 Z’aba, 2010 Bilmes J, Asanovic K, Chin C, Demmel J. Optimizing matrix multiply using PHiPAC: A portable, high-performance, Ansi C coding methodology. In: International conference on supercomputing. 1997. Brent, 1970 Daemen, 2013