Abstract
Encryption hardware is not available on most computer systems in use today. Despite this fact, there is no well accepted encryption function designed for software implementation — instead, hardware designs are emulated in software and the resulting performance loss is tolerated. The obvious solution is to design an encryption function for implementation in software. Such an encryption function is presented here — on a SUN 4/260 it can encrypt at 4 to 8 megabits per second. The combination of modem processor speeds and a faster algorithm make software encryption feasible in applications which previously would have required hardware. This will effectively reduce the cost and increase the availability Of cryptographic protection.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Bibliography
“Secrecy, Authentication, and Public Key Systems”, Stanford Ph.D. thesis, 1979, by Ralph C. Merkle.
“A Certified Digital Signature”, Crypto’ 89.
Moti Yung, private communication.
“A High Speed Manipulation Detection Code”, by Robert R. Jueneman, Advances in Cryptology-CRYPTO’ 86, Springer Verlag, Lecture Notes on Computer Science, Vol. 263, page 327 to 346.
“Another Birthday Attack” by Don Coppersmith, Advances in Cryptology-CRYPTO’ 85, Springer Verlag, Lecture Notes on Computer Science, Vol. 218, pages 14 to 17.
“A digital signature based on a conventional encryption function”, by Ralph C. Merkle, Advances in Cryptology CRYPTO 87, Springer Verlag, Lecture Notes on Computer Science, Vol. 293, page 369–378.
“Cryptography and Data Security”, by Dorothy E. R. Denning, Addison-Wesley 1982, page 170.
“On the security of multiple encryption”, by Ralph C. Merkle, CACM Vol. 24 No. 7, July 1981 pages 465 to 467.
“Results of an initial attempt to cryptanalyze the NBS Data Encryption Standard”, by Martin Hellman et al., Information Systems lab. report SEL 76-042, Stanford Univer-sity 1976.
“Communication Theory of Secrecy Systems”, by C. E. Shannon, Bell Sys. Tech. Jour. 28 (Oct. 1949) 656–715
“Message Authentication” by R. R. Jueneman, S. M. Matyas, C. H. Meyer, IEEE Communications Magazine, Vol. 23, No. 9, September 1985 pages 29–40.
“Generating strong one-way functions with cryptographic algorithm”, by S. M. Matyas, C. H. Meyer, and J. Oseas, IBM Technical Disclosure Bulletin, Vol. 27, No. 10A, March 1985 pages 5658–5659
“Analysis of Jueneman’s MDC Scheme”, by Don Coppersmith, preliminary version June 9, 1988. Analysis of the system presented in [4].
“The Data Encryption Standard: Past and Future” by M.E. Smid and D.K. Branstad, Proc. of the IEEE, Vol 76 No. 5 pp 550–559, May 1988
“Defending Secrets, Sharing Data: New Locks and Keys for Electronic Information”, U.S. Congress, Office of Technology Assessment, OTA-CIT-310, U.S. Government Printing Office, October 1987
“Exhaustive cryptanalysis of the NBS data encryption standard”, by Whitfield Diffie and Martin Hellman, Computer, June 1977, pages 74–78
“Cryptography: a new dimension in data security”, by Carl H. Meyer and Stephen M. Matyas, Wiley 1982.
“One Way Hash Functions and DES”, by Ralph C. Merkle, Crypto’ 89.
“Data Encryption Standard (DES)”, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication 46, National Technical Information Service, Springfield, VA, Apr. 1977
“Cryptography and Computer Privacy”, by H. Feistel, Sci. Amer. Vol. 228, No. 5 pp 15–23, May 1973
“Maximum Likelihood Estimation Applied to Cryptanalysis”, by Dov Andelman, Stanford Ph.D. Thesis, 1979
IBM has recently proposed a specific one-way hash function which has so far resisted attack.
“A Fast Software One-Way Hash Function,” submitted to the Journal of Cryptology. The C source for this method is available by anonymous FTP from arisia.xerox.com (13.1.100.206) in directory /pub/hash.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1991 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Merkle, R.C. (1991). Fast Software Encryption Functions. In: Menezes, A.J., Vanstone, S.A. (eds) Advances in Cryptology-CRYPTO’ 90. CRYPTO 1990. Lecture Notes in Computer Science, vol 537. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-38424-3_34
Download citation
DOI: https://doi.org/10.1007/3-540-38424-3_34
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-54508-8
Online ISBN: 978-3-540-38424-3
eBook Packages: Springer Book Archive