• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Advisory Board
    • Editorial Staff
    • Publication Ethics
    • Indexing and Abstracting
    • Related Links
    • FAQ
    • Peer Review Process
    • News
  • Guide for Authors
  • Submit Manuscript
  • Reviewers
  • Contact Us
 
  • Login ▼
    • Login
    • Register
  • Persian
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter Telegram
Journal of Computing and Security
Articles in Press
Current Issue
Journal Archive
Volume Volume 3 (2016)
Volume Volume 2 (2015)
Volume Volume 1 (2014)
Issue Issue 2
Issue Issue 4
Issue Issue 3
Issue Issue 1
Mala, H. (2014). Unified Byte Permutations for the Block Cipher 3D. Journal of Computing and Security, 1(1), -.
Hamid Mala. "Unified Byte Permutations for the Block Cipher 3D". Journal of Computing and Security, 1, 1, 2014, -.
Mala, H. (2014). 'Unified Byte Permutations for the Block Cipher 3D', Journal of Computing and Security, 1(1), pp. -.
Mala, H. Unified Byte Permutations for the Block Cipher 3D. Journal of Computing and Security, 2014; 1(1): -.

Unified Byte Permutations for the Block Cipher 3D

Article 2, Volume 1, Issue 1, Winter 2014  XML PDF (561 K)
Author
Hamid Mala
Department of Information Technology Engineering, University of Isfahan
Abstract
3D is a 512-bit block cipher whose design is inspired from the Advanced Encryption Standard (AES). Like the AES, each round of 3D is composed of 4 transformations including a round-key addition, a byte-wise substitution, a byte-wise shuffle and an MDS matrix multiplication. In 3D, two distinct byte-wise permutations are employed for odd and even rounds. In this paper, using concepts from graph theory, we design a unified byte permutation for both odd and even rounds with the same diffusion property as the original cipher. The main advantage of this new transformation is in hardware implementation of the cipher where with less resources we can speed up the encryption/decryption process. 
Statistics
Article View: 1,289
PDF Download: 31
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

Journal Management System. Designed by sinaweb.