Title :
On permutation operations in cipher design
Author :
Lee, Ruby B. ; Shi, Z.J. ; Yin, Y.L. ; Rivest, Ronald L. ; Robshaw, M.J.B.
Author_Institution :
Dept. of Electr. Eng., Princeton Univ., NJ, USA
Abstract :
New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. We consider recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However, bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes.
Keywords :
computer architecture; cryptography; instruction sets; multimedia systems; security of data; bit-level permutations; cipher design; computer architectures; cryptographic purpose; instruction-set architecture; multimedia processing; permutation operations; processor architecture; Algorithm design and analysis; Application software; Computer architecture; Cryptography; Energy consumption; Information processing; Information security; Instruction sets; Proposals; Technological innovation;
Conference_Titel :
Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004. International Conference on
Print_ISBN :
0-7695-2108-8
DOI :
10.1109/ITCC.2004.1286714