@InProceedings{LSYRR04, author = { Ruby B. Lee and Zhijie J. Shi and Yiqun Lisa Yin and Ronald L. Rivest and Matthew J. B. Robshaw }, title = { On Permutation Operations in Cipher Design }, pages = { 569--577 }, doi = { 10.1109/ITCC.2004.1286714 }, booktitle = { Proceedings International Conference on Information Technology: Coding and Computing, 2004 }, editor = { Pradip K. Srimani }, publisher = { IEEE }, isbn = { 0-7695-2108-8 }, date = { 2004-04 }, OPTyear = { 2004 }, OPTmonth = { April 5--7, }, eventtitle = { ITCC'04 }, eventdate = { 2004-04-05/2004-04-07 }, venue = { Las Vegas, Nevada }, volume = { 2 }, abstract = { New and emerging applications can change the mix of operations commonly used within computer architectures. It is sometimes surprising when instruction-set architecture (ISA) innovations intended for one purpose are used for other (initially unintended) purposes. This paper considers recent proposals for the processor support of families of bit-level permutations. From a processor architecture point of view, the ability to support very fast bit-level permutations may be viewed as a further validation of the basic word-orientation of processors, and their ability to support next-generation secure multimedia processing. However, bitwise permutations are also fundamental operations in many cryptographic primitives and we discuss the suitability of these new operations for cryptographic purposes. }, }