On permutation operations in cipher design

Ruby B. Lee, Z. J. Shi, Y. L. Yin, Ronald L. Rivest, M. J.B. Robshaw

Research output: Chapter in Book/Report/Conference proceedingConference contribution

19 Scopus citations

Abstract

New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. This paper considers recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However, bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes.

Original languageEnglish (US)
Title of host publicationInternational Conference on Information Technology
Subtitle of host publicationCoding Computing, ITCC 2004
EditorsP.K. Srimani, A. Abraham, M. Cannataro, J. Domingo-Ferrer, R. Hashemi
Pages569-577
Number of pages9
DOIs
StatePublished - 2004
EventInternational Conference on Information Technology: Coding Computing, ITCC 2004 - Las Vegas, NV, United States
Duration: Apr 5 2004Apr 7 2004

Publication series

NameInternational Conference on Information Technology: Coding Computing, ITCC
Volume2

Other

OtherInternational Conference on Information Technology: Coding Computing, ITCC 2004
CountryUnited States
CityLas Vegas, NV
Period4/5/044/7/04

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Engineering(all)

Fingerprint Dive into the research topics of 'On permutation operations in cipher design'. Together they form a unique fingerprint.

Cite this