Substitution–permutation network: Difference between revisions
Skittlesjc (talk | contribs) removed vandalism |
No edit summary |
||
Line 6: | Line 6: | ||
S-boxes substitute or transform input bits into output bits. A good S-box will have the property that changing one input [[bit]] will change about half of the output bits. It will also have the property that each output bit will depend on every input bit. P-boxes permute or transpose bits across S-box inputs. In addition, at each round the [[key (cryptography)|key]] is combined using some group operation, typically XOR. |
S-boxes substitute or transform input bits into output bits. A good S-box will have the property that changing one input [[bit]] will change about half of the output bits. It will also have the property that each output bit will depend on every input bit. P-boxes permute or transpose bits across S-box inputs. In addition, at each round the [[key (cryptography)|key]] is combined using some group operation, typically XOR. |
||
==References== |
|||
* Jonathan Katz and Yehuda Lundell, "Introduction to Modern Cryptography". CRC Press, 2007. |
|||
== See also == |
== See also == |
Revision as of 19:03, 21 November 2007
- SPN redirects here. A Service Principal Name (SPN) is used in the Kerberos protocol.
In cryptography, an SP-network, or substitution-permutation network (SPN), is a series of linked mathematical operations used in block cipher algorithms such as AES.
These networks consist of S-boxes and P-boxes that transform blocks of input bits into output bits. It is common for these transformations to be operations that are efficient to perform in hardware, such as exclusive or (XOR).
S-boxes substitute or transform input bits into output bits. A good S-box will have the property that changing one input bit will change about half of the output bits. It will also have the property that each output bit will depend on every input bit. P-boxes permute or transpose bits across S-box inputs. In addition, at each round the key is combined using some group operation, typically XOR.
References
- Jonathan Katz and Yehuda Lundell, "Introduction to Modern Cryptography". CRC Press, 2007.