Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Randomized nonlinear software-oriented MDS diffusion layers

Randomized nonlinear software-oriented MDS diffusion layers AbstractMDS diffusion layers are critical components in the design of symmetric ciphers.In this paper, after introducing some new algebraic structures, we provide new MDS matrices over special types of R-modules.With the help of the proposed methodology, we have more flexibility in designing software-oriented diffusion layers.Most notably, we construct randomized and/or nonlinear MDS diffusion layers, based upon the presented theoretical results, and discuss the resistance of the presented diffusion layers against various kinds of cryptanalysis, compared with classical linear diffusion layers. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Groups Complexity Cryptology de Gruyter

Randomized nonlinear software-oriented MDS diffusion layers

Loading next page...
 
/lp/de-gruyter/randomized-nonlinear-software-oriented-mds-diffusion-layers-08t3FUusEL

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
de Gruyter
Copyright
© 2019 Walter de Gruyter GmbH, Berlin/Boston
ISSN
1869-6104
eISSN
1869-6104
DOI
10.1515/gcc-2019-2011
Publisher site
See Article on Publisher Site

Abstract

AbstractMDS diffusion layers are critical components in the design of symmetric ciphers.In this paper, after introducing some new algebraic structures, we provide new MDS matrices over special types of R-modules.With the help of the proposed methodology, we have more flexibility in designing software-oriented diffusion layers.Most notably, we construct randomized and/or nonlinear MDS diffusion layers, based upon the presented theoretical results, and discuss the resistance of the presented diffusion layers against various kinds of cryptanalysis, compared with classical linear diffusion layers.

Journal

Groups Complexity Cryptologyde Gruyter

Published: Nov 1, 2019

There are no references for this article.