Construction of a cryptosystem using the AES box and a bijective function from the natural numbers to the set of permutations

  • Víctor Manuel Silva García CIDETEC-IPN
  • Michael Klaus Lindig Bos CIDETEC-IPN
  • Cornelio Yáñez Márquez CIC-IPN
  • Rolando Flores Carapia CIC-IPN
  • Itzamá López Yáñez CIC-IPN
Keywords: JV theorem, factorial theorem, factorial cryptosystem, permutations, AES

Abstract

Given a positive integer n, an algorithm is constructed that associates to each positive integer m, with 0 ≤ m ≤ n!-1, a permutation of n different elements in n-1 steps. In fact, the algorithm defines a bijective function, that is, one-to-one and onto, from the set of natural numbers to the set of permutations. Furthermore, for any permutation πL defi ned in the set of numbers {0,1, …,L-1}, with L a multiple of 3, this permutation may be constructed by means of 3 permutations defined on the set of numbers {0,1,…,2/3L-1}. The former allows to defi ne a cryptosystem on blocks of chains of 96 bits in length where one operates on numbers of 64! – 1 ≈ 1090 instead of 96! – 1 ≈ 10150, which reduces time and computational resources. It is also shown that the set of keys grows factorially in such a way that the amount of elements of the set is of the order of 10150 ≈ 2500 when working with chains of 96 bits. An example is given using the box of the Advanced Encryption Standard (AES) and an encryption procedure for blocks of 96 bits of clear text. The AES box is proposed because it is highly non-linear [1]. A hardware design for this cryptosystem is given to be implemented. Finally, we mention that by associating a permutation to an integer the permutations may be variable, that is, the permutations may be considered to be keys. 

Author Biographies

Víctor Manuel Silva García, CIDETEC-IPN

Lic. en Física y Matemáticas, Dr. en Ciencias de la Computación, Profesor Titular, CIDETEC-IPN, D.F. México.

Michael Klaus Lindig Bos, CIDETEC-IPN

Ing.Dr. en C., Profesor Titular, CIDETEC-IPN, D.F. México.

Cornelio Yáñez Márquez, CIC-IPN

Lic. en Física y Matemáticas, Dr. en Ciencias de la Computación, Profesor Titular, CIC-IPN, D.F. México.

Rolando Flores Carapia, CIC-IPN

Ing. en Comunicaciones y Electrónica, Maestro en Ciencias de la Computación, Estudiante de Doctorado, CIC-IPN, D.F. México.

Itzamá López Yáñez, CIC-IPN

Ing. en Sistemas de Información, Maestro en Ciencias de la Computación, Estudiante de Doctorado, CIC-IPN, D.F. México.

Downloads

Download data is not yet available.

Languages:

es

Author Biographies

Víctor Manuel Silva García, CIDETEC-IPN

Lic. en Física y Matemáticas, Dr. en Ciencias de la Computación, Profesor Titular, CIDETEC-IPN, D.F. México.

Michael Klaus Lindig Bos, CIDETEC-IPN

Ing.Dr. en C., Profesor Titular, CIDETEC-IPN, D.F. México.

Cornelio Yáñez Márquez, CIC-IPN

Lic. en Física y Matemáticas, Dr. en Ciencias de la Computación, Profesor Titular, CIC-IPN, D.F. México.

Rolando Flores Carapia, CIC-IPN

Ing. en Comunicaciones y Electrónica, Maestro en Ciencias de la Computación, Estudiante de Doctorado, CIC-IPN, D.F. México.

Itzamá López Yáñez, CIC-IPN

Ing. en Sistemas de Información, Maestro en Ciencias de la Computación, Estudiante de Doctorado, CIC-IPN, D.F. México.

References

DOUGLAS R. STINSON, 2002, CRYPTOGRAPHY: Theory and practice, CHAPMAN HALL/ CRC Press, second edition, pp. 74-116.

DOUGLAS R. STINSON, 1995, CRYPTOGRAPHY: Theory and practice, CRC Press, pp. 70-113.

HERSTEIN I.N., 1986, Álgebra Abstracta, Grupo Editorial Iberoamérica, pp. 22 y 11.

LINDIG BOS M., SILVA GARCÍA V.M., 2006, “Diseño de un dispositivo para encripción de datos en tiempo real”, CIDETEC-ESIQIE-IPN., vol. 2.

J. DAEMEN and V. RIJMEN, 1999, AES Proposal: Rijndael, AES algorithm Submi-ssion, FIPS 197.

BIHAM E. and SHAMIR A., 1993, “Differential cryptanalysis of the full 16-round DES”, Lecturer Notes in computer Science.

MATSUI M, 1994, “Linear Cryptanalysis for DES cipher”, Lecture Notes in Computer Science.

R. GREENLAW and H. J. HOOVER, 1998, Fundamentals of the Theory of Computation, Morgan-Kaufmann Publishers, Inc., pp. 241-257, San Francisco, California.

H. VOLLMER, 1999, Introduction to Circuit Complexity: a Uniform Approach, Springer Verlag, ISBN 3-540-64310-9.

T. LEIGHTON, 1992, Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes, Morgan-Kaufmann Publishers, San Mateo, California, pp. 394.

AX Detailed Specs_DS, 2005, Actel Corp.

ROSEN K., 2003, Discrete Mathematics and its Applications, Mc. Graw Hill, fifth edition.

Koblitz M., 1987, A Course in Number Theory and Cryptography, Springer-Verlag, pp. 53-80, New York Inc.

How to Cite
Silva García, V. M., Lindig Bos, M. K., Yáñez Márquez, C., Flores Carapia, R., & López Yáñez, I. (2009). Construction of a cryptosystem using the AES box and a bijective function from the natural numbers to the set of permutations. Ciencia E Ingenieria Neogranadina, 19(1), 5–24. https://doi.org/10.18359/rcin.307
Published
2009-06-01
Section
ARTICLES

Altmetric

Crossref Cited-by logo
QR Code