On Permutation Operations in Cipher Design

  • Authors:
  • Ruby B. Lee;Z. J. Shi;Y. L. Yin;Ronald L. Rivest;M. J. B. Robshaw

  • Affiliations:
  • -;-;-;-;-

  • Venue:
  • ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

New and emerging applications can change the mix ofoperations commonly used within computer architectures.It is sometimes surprising when instruction-set architecture(ISA) innovations intended for one purpose are used forother (initially unintended) purposes. This paper considersrecent proposals for the processor support of familiesof bit-level permutations. From a processor architecturepoint of view, the ability to support very fast bit-level permutationsmay be viewed as a further validation of the basicword-orientation of processors, and their ability to supportnext-generation secure multimedia processing. However,bitwise permutations are also fundamental operationsin many cryptographic primitives and we discuss the suitabilityof these new operations for cryptographic purposes.