TY - GEN
T1 - Dynamic substitution model
AU - El-Fotouh, Mohamed Abo
AU - Diepold, Klaus
PY - 2008
Y1 - 2008
N2 - In this paper, we present the Dynamic Substitution Model (DSM) and its variant the Static Substitution Model (SSM). In DSM and SSM, the secret encryption key is divided into a primary key and a secondary key. DSM is a model that allows any block cipher to accept a variable length secondary key, this is achieved by substituting some bits of the cipher's expanded key with the secondary key. SSM is a variant of DSM, where the secondary key length and the positions of the replaced bits of the subkeys are determined in the design time. We used the Advanced Encryption Standard (AES) to demonstrate the usage of DSM and SSM models.
AB - In this paper, we present the Dynamic Substitution Model (DSM) and its variant the Static Substitution Model (SSM). In DSM and SSM, the secret encryption key is divided into a primary key and a secondary key. DSM is a model that allows any block cipher to accept a variable length secondary key, this is achieved by substituting some bits of the cipher's expanded key with the secondary key. SSM is a variant of DSM, where the secondary key length and the positions of the replaced bits of the subkeys are determined in the design time. We used the Advanced Encryption Standard (AES) to demonstrate the usage of DSM and SSM models.
UR - http://www.scopus.com/inward/record.url?scp=55349135559&partnerID=8YFLogxK
U2 - 10.1109/IAS.2008.20
DO - 10.1109/IAS.2008.20
M3 - Conference contribution
AN - SCOPUS:55349135559
SN - 9780769533247
T3 - Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
SP - 108
EP - 111
BT - Proceedings - The 4th International Symposium on Information Assurance and Security, IAS 2008
T2 - 4th International Symposium on Information Assurance and Security, IAS 2008
Y2 - 8 September 2008 through 10 September 2008
ER -