Construction of a cryptosystem using the AES box and a bijective function from the natural numbers to the set of permutations
Abstract
Given a positive integer n, an algorithm is constructed that associates to each positive integer m, with 0 ≤ m ≤ n!-1, a permutation of n different elements in n-1 steps. In fact, the algorithm defines a bijective function, that is, one-to-one and onto, from the set of natural numbers to the set of permutations. Furthermore, for any permutation πL defi ned in the set of numbers {0,1, …,L-1}, with L a multiple of 3, this permutation may be constructed by means of 3 permutations defined on the set of numbers {0,1,…,2/3L-1}. The former allows to defi ne a cryptosystem on blocks of chains of 96 bits in length where one operates on numbers of 64! – 1 ≈ 1090 instead of 96! – 1 ≈ 10150, which reduces time and computational resources. It is also shown that the set of keys grows factorially in such a way that the amount of elements of the set is of the order of 10150 ≈ 2500 when working with chains of 96 bits. An example is given using the box of the Advanced Encryption Standard (AES) and an encryption procedure for blocks of 96 bits of clear text. The AES box is proposed because it is highly non-linear [1]. A hardware design for this cryptosystem is given to be implemented. Finally, we mention that by associating a permutation to an integer the permutations may be variable, that is, the permutations may be considered to be keys.
Downloads
References
DOUGLAS R. STINSON, 2002, CRYPTOGRAPHY: Theory and practice, CHAPMAN HALL/ CRC Press, second edition, pp. 74-116.
DOUGLAS R. STINSON, 1995, CRYPTOGRAPHY: Theory and practice, CRC Press, pp. 70-113.
HERSTEIN I.N., 1986, Álgebra Abstracta, Grupo Editorial Iberoamérica, pp. 22 y 11.
LINDIG BOS M., SILVA GARCÍA V.M., 2006, “Diseño de un dispositivo para encripción de datos en tiempo real”, CIDETEC-ESIQIE-IPN., vol. 2.
J. DAEMEN and V. RIJMEN, 1999, AES Proposal: Rijndael, AES algorithm Submi-ssion, FIPS 197.
BIHAM E. and SHAMIR A., 1993, “Differential cryptanalysis of the full 16-round DES”, Lecturer Notes in computer Science.
MATSUI M, 1994, “Linear Cryptanalysis for DES cipher”, Lecture Notes in Computer Science.
R. GREENLAW and H. J. HOOVER, 1998, Fundamentals of the Theory of Computation, Morgan-Kaufmann Publishers, Inc., pp. 241-257, San Francisco, California.
H. VOLLMER, 1999, Introduction to Circuit Complexity: a Uniform Approach, Springer Verlag, ISBN 3-540-64310-9.
T. LEIGHTON, 1992, Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes, Morgan-Kaufmann Publishers, San Mateo, California, pp. 394.
AX Detailed Specs_DS, 2005, Actel Corp.
ROSEN K., 2003, Discrete Mathematics and its Applications, Mc. Graw Hill, fifth edition.
Koblitz M., 1987, A Course in Number Theory and Cryptography, Springer-Verlag, pp. 53-80, New York Inc.