REBEL: Reconfigurable Block Encryption Logic Metadata

Metadata describes a digital item, providing (if known) such information as creator, publisher, contents, size, relationship to other resources, and more. Metadata may also contain "preservation" components that help us to maintain the integrity of digital files over time.

Title

  • Main Title REBEL: Reconfigurable Block Encryption Logic

Creator

  • Author: Gomathisankaran, Mahadevan
    Creator Type: Personal
    Creator Info: University of North Texas; Iowa State University
  • Author: Tyagi, Akhilesh
    Creator Type: Personal
    Creator Info: Iowa State University

Date

  • Creation: 2006-09-01

Language

  • English

Description

  • Content Description: This paper discusses reconfigurable block encryption logic. Existing block cipher function designs have tended to deploy the secret bits in a specific and limited way. The authors generalize the role of the secret as truth tables of Boolean gates in a carefully designed logic schema.
  • Physical Description: 23 p.

Subject

  • Keyword: block cipher functions
  • Keyword: REBEL
  • Keyword: encryption logic

Collection

  • Name: UNT Scholarly Works
    Code: UNTSW

Institution

  • Name: UNT College of Engineering
    Code: UNTCOE

Rights

  • Rights Access: public

Resource Type

  • Paper

Format

  • Text

Identifier

  • Archival Resource Key: ark:/67531/metadc96662

Degree

  • Academic Department: Computer Science and Engineering

Note

  • Display Note: Abstract: This paper discusses reconfigurable block encryption logic. Existing block cipher function designs have tended to deploy the secret bits in a specific and limited way. The authors generalize the role of the secret as truth tables of Boolean gates in a carefully designed logic schema. The authors' claims are: these reconfigurable functions are pseudo one-way and pseudo random functions. Such a function family is proposed using reconfigurable gates. Based on this function family the authors create REBEL, Reconfigurable Block Encryption Logic, which is an LR-Network. The authors prove cryptographic and cryptanalytic security for REBEL. From cryptographic perspective, this function is a pseudo-permutation. From cryptanalysis perspective, any observable attribute appears to be a random process.