TY - JOUR
T1 - Algorithm for strengthening some cryptographic systems
AU - Víctor Manuel Silva, G.
AU - Rolando Flores, C.
AU - Itzamá López, Y.
AU - Carlos Rentería, M.
PY - 2010
Y1 - 2010
N2 - In the present work a field is built on the set of permutations, using the construction of a bijection, Im, which goes from the set Nm = {n ∈ N{double-struck}|0 ≤ n ≤ m! - 1} to the set IIm = {π|π is a permutation of array 0, 1, 2,...,m -1}. During this work, it is shown that this bijection defines an isomorphism Im: Nm → Πm; also, two binary operations -⊙ and -⊕ on the set IIm are defined, such that a field can be built on a subset of IIm. On the other side, it is also possible to define a unary operation on IIm whose result is the inverse of a permutation, denoted as ¬π. Finally, an application of this tool to cryptography is presented, specifically to symmetric cryptosystems DES and Triple DES [1], with a modification: the inverse permutation at the end of the ciphering process is not applied; only the initial permutation is applied, but using a variable permutation. It can be seen that, as a result, both cryptosystems are strengthened against brute-force attacks, as well as against differential and linear cryptanalysis in the case of DES [2],[3].
AB - In the present work a field is built on the set of permutations, using the construction of a bijection, Im, which goes from the set Nm = {n ∈ N{double-struck}|0 ≤ n ≤ m! - 1} to the set IIm = {π|π is a permutation of array 0, 1, 2,...,m -1}. During this work, it is shown that this bijection defines an isomorphism Im: Nm → Πm; also, two binary operations -⊙ and -⊕ on the set IIm are defined, such that a field can be built on a subset of IIm. On the other side, it is also possible to define a unary operation on IIm whose result is the inverse of a permutation, denoted as ¬π. Finally, an application of this tool to cryptography is presented, specifically to symmetric cryptosystems DES and Triple DES [1], with a modification: the inverse permutation at the end of the ciphering process is not applied; only the initial permutation is applied, but using a variable permutation. It can be seen that, as a result, both cryptosystems are strengthened against brute-force attacks, as well as against differential and linear cryptanalysis in the case of DES [2],[3].
KW - Cryptography JV theorem
KW - DES
KW - Triple-DES
UR - http://www.scopus.com/inward/record.url?scp=77953352423&partnerID=8YFLogxK
M3 - Artículo
SN - 1312-885X
VL - 4
SP - 967
EP - 976
JO - Applied Mathematical Sciences
JF - Applied Mathematical Sciences
IS - 17-20
ER -