Dynamic Permutations
Keywords:
confusion, diffusion, linear function, nonlinear function, static permutations, dynamic permutations, one-way functions, hash table and complexity
Abstract
The confidentiality integrity and authentication of anelectronic documentare necessary in many application systems The security of confidentiality integrity and authentication of an electronic document are based on nonlinear functions in which there is no directrelationship between the inputs and the outputs This means that the inputs cannot be extracted from the outputs Indeed all modern cyphers are based on the concept of substitution transposition In data encryption standard algorithm DES which consists of many functions only one nonlinear function is used in the algorithm called substitution boxes and all other functions are linear one of these linear functions is called IP initial permutation function which performs static permutations The permutations are replaced by transpositions based on predefined positions and the permutation function is used several times in DES algorithm
Downloads
- Article PDF
- TEI XML Kaleidoscope (download in zip)* (Beta by AI)
- Lens* NISO JATS XML (Beta by AI)
- HTML Kaleidoscope* (Beta by AI)
- DBK XML Kaleidoscope (download in zip)* (Beta by AI)
- LaTeX pdf Kaleidoscope* (Beta by AI)
- EPUB Kaleidoscope* (Beta by AI)
- MD Kaleidoscope* (Beta by AI)
- FO Kaleidoscope* (Beta by AI)
- BIB Kaleidoscope* (Beta by AI)
- LaTeX Kaleidoscope* (Beta by AI)
How to Cite
Published
2015-01-15
Issue
Section
License
Copyright (c) 2015 Authors and Global Journals Private Limited
This work is licensed under a Creative Commons Attribution 4.0 International License.