Silylation of Deoxynucleotide Analog Yields an Orally Available Drug with Anti-Leukemia Effects

Total Page:16

File Type:pdf, Size:1020Kb

Silylation of Deoxynucleotide Analog Yields an Orally Available Drug with Anti-Leukemia Effects Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 1 Original article 2 Silylation of deoxynucleotide analog yields an orally available drug 3 with anti-leukemia effects 4 5 Hiroshi Ureshino1,2†, Yuki Kurahashi1†, Tatsuro Watanabe1, Satoshi Yamashita3, 6 Kazuharu Kamachi1,2, Yuta Yamamoto1, Yuki Fukuda-Kurahashi1, Nao 7 Yoshida-Sakai1,2, Naoko Hattori3, Yoshihiro Hayashi4, Atsushi Kawaguchi5, Kaoru 8 Tohyama6, Seiji Okada7, Hironori Harada4, Toshikazu Ushijima3, and Shinya Kimura1, 9 2* 10 11 † These authors equally contributed to this work. 12 13 1Department of Drug Discovery and Biomedical Sciences, Faculty of Medicine, Saga 14 University, Saga, Japan; 2Division of Hematology, Respiratory Medicine and Oncology, 15 Department of Internal Medicine, Faculty of Medicine, Saga University, Saga, Japan; 16 3Division of Epigenomics, National Cancer Center Research Institute, Tokyo, Japan; 17 4Laboratory of Oncology, School of Life Sciences, Tokyo University of Pharmacy and 18 Life Sciences, Tokyo, Japan; 5Center for Comprehensive Community Medicine, Faculty 19 of Medicine Saga University, Saga, Japan; 6Department of Laboratory Medicine, 20 Kawasaki Medical School, Kurashiki, Japan; 7Division of Hematopoiesis, Joint 21 Research Center for Human Retrovirus Infection, Kumamoto, Japan. 22 23 *Corresponding author: Shinya Kimura, MD, PhD 24 5-1-1 Nabeshima, Saga 849-8501, Japan 25 Phone: +81-952-34-2366, Fax: +81-952-34-2017 26 E-mail: [email protected] 1 Downloaded from mct.aacrjournals.org on October 1, 2021. © 2021 American Association for Cancer Research. Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 27 Conflict-of-interest disclosure: This work was supported by Ohara Pharmaceutical. 28 29 Running title: Silylation of DAC for MDS and AML 30 Main text: 4115 words 31 Abstract: 248 words 32 Figures: 6 33 References: 50 34 Supplementary figure, 16; Tables, 4; method, 1 35 Supplementary figure only for reviewers: 1 36 2 Downloaded from mct.aacrjournals.org on October 1, 2021. © 2021 American Association for Cancer Research. Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 37 Abstract 38 DNA methyltransferase inhibitors have improved the prognosis of myelodysplastic 39 syndrome (MDS) and acute myeloid leukemia (AML). However, because these agents 40 are easily degraded by cytidine deaminase (CDA), they must be administered 41 intravenously or subcutaneously. Recently, two orally bioavailable DNA 42 methyltransferase inhibitors, CC-486 and ASTX727, were approved. In previous work, 43 we developed 5-O-trialkylsilylated decitabines that resist degradation by CDA. 44 However, the effects of silylation of a deoxynucleotide analog and enzymatic cleavage 45 of silylation have not been fully elucidated. Enteric administration of OR21 in a 46 cynomolgus monkey model led to high plasma concentrations and hypomethylation, 47 and in a mouse model, oral administration of enteric-coated OR21 led to high plasma 48 concentrations. The drug became biologically active after release of decitabine (DAC) 49 from OR21 following removal of the 5'-O-trisilylate substituent. Toxicities were 50 tolerable and lower than those of DAC. Transcriptome and methylome analysis of MDS 51 and AML cell lines revealed that OR21 increased expression of genes associated with 52 tumor suppression, cell differentiation, and immune system processes by altering 53 regional promoter methylation, indicating that these pathways play pivotal roles in the 54 action of hypomethylating agents. OR21 induced cell differentiation via upregulation of 55 the late cell differentiation drivers CEBPE and GATA-1. Thus, silylation of a 56 deoxynucleotide analog can confer oral bioavailability without new toxicities. Both in 57 vivo and in vitro, OR21 exerted anti-leukemia effects, and had a better safety profile 3 Downloaded from mct.aacrjournals.org on October 1, 2021. © 2021 American Association for Cancer Research. Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 58 than DAC. Together, our findings indicate that OR21 is a promising candidate drug for 59 phase 1 study as an alternative to azacitidine or decitabine. 60 Keywords: silylation, hypomethylating, orally available, OR-2100, myelodysplastic 61 syndrome, acute myeloid leukemia 62 4 Downloaded from mct.aacrjournals.org on October 1, 2021. © 2021 American Association for Cancer Research. Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 63 Introduction 64 Myelodysplastic syndrome (MDS) and acute myeloid leukemia (AML) are 65 characterized by impaired differentiation of hematopoietic stem cells (HSCs) or 66 hematopoietic progenitor cells (1,2). Somatic mutations and aberrant DNA 67 hypermethylation that silence cancer-regulating genes (e.g., tumor-suppressor genes) in 68 these cells (3) are involved in pathogenesis and progression of MDS and AML (4–8). 69 Epigenetic alterations lead to reduced hypermethylation, which can in turn cause 70 re-expression of silenced tumor-regulating genes. These alterations represent novel 71 therapeutic targets for both of these cancers (9). 72 Although the clinically available DNA methyltransferase (DNMT) inhibitors 73 azacitidine (AZA) and decitabine (DAC) have improved the prognosis of MDS and 74 AML (10,11), they are easily degraded by cytidine deaminase (CDA), limiting their 75 bioavailability after oral administration; consequently, they must be administered 76 intravenously or subcutaneously. The efficacy and safety of oral AZA or DAC, as well 77 as the combination of these drugs with CDA inhibitors, has been evaluated in clinical 78 trials (12–14), resulting in the approval of CC-486 (oral AZA) and ASTX727 (DAC 79 plus cedazuridine, a CDA inhibitor) (13,14). 80 Resistance to CDA is crucial for achieving elevated plasma concentrations of these 81 drugs, which would in turn increase efficacy (15). Silylation of glycoproteins is known 82 to influence their stabilities and therapeutic effects (16,17); however, the effects of 83 silylation of deoxynucleotide analogs and enzymatic cleavage of silylation have not 84 been fully elucidated. In previous work, we developed 5-O-trialkylsilylated DACs that 5 Downloaded from mct.aacrjournals.org on October 1, 2021. © 2021 American Association for Cancer Research. Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 85 were resistant to CDA and exerted anti-cancer effects against solid tumors and adult 86 T-cell leukemia/lymphoma (18,19). In this study, we assessed the oral bioavailability 87 and efficacy of 5-O-trialkylsilylated DAC for treatment of MDS and AML both in vitro 88 and in vivo. 89 90 Materials and methods 91 Reagents 92 5-O-trialkylsilylated DAC (OR2100, 2003, 2007, 2008, 2009, 2010, 2102, 2103, 2104, 93 and 2201) was obtained from Ohara Pharmaceutical (Shiga, Japan). AZA and DAC 94 were purchased from Sigma-Aldrich (St. Louis, MO, USA). All reagents were dissolved 95 in dimethylsulfoxide (DMSO) and stored at -20°C. 96 97 Pharmacokinetic (PK) studies in cynomolgus monkeys and mice 98 All procedures were performed at NISSEI BILIS. The study was compliant with Ohara 99 Pharmaceutical policies on bioethics in animal work, and all procedures were compliant 100 with the relevant national and international guidelines for the care and use of 101 experimental animals. Procedures for PK studies are described in Supplementary 102 methods. 103 104 Cell lines and cultures 105 The MDS-L cell line was derived from the non-leukemic phase of a patient with MDS 106 with refractory anemia-ringed sideroblasts (20). SKM1 cells (derived from the blast 6 Downloaded from mct.aacrjournals.org on October 1, 2021. © 2021 American Association for Cancer Research. Author Manuscript Published OnlineFirst on May 27, 2021; DOI: 10.1158/1535-7163.MCT-20-1125 Author manuscripts have been peer reviewed and accepted for publication but have not yet been edited. Ureshino et al. Silylation of DAC for MDS and AML. 107 cells of a patient with MDS) were purchased from the Japanese Collection of Research 108 Bioresources Cell Bank (Osaka, Japan). HL60, THP-1, KG1a, and Kasumi-1 cell lines 109 (derived from AML patients) were purchased from the American Type Culture 110 Collection (Rockville, MD, USA). AZA-resistant HL60 (HL60R) cells were established. 111 Detailed cell culture methods are described in Supplementary methods. 112 113 Primary patient samples 114 Primary samples were obtained from patients with MDS or AML. Experiments were 115 approved by the Institutional Review Board of Saga University, and all procedures 116 involving human participants were undertaken in accordance with the principles of the 117 Declaration of Helsinki. 118 119 Western blot analysis 120 Western blot analyses were performed to assess the protein levels of DNMT1, UCK1, 121 UCK2, and DCK. Procedures are described in Supplementary methods. 122 123 Pyrosequencing assay of long interspersed nucleotide element-1 (LINE-1) and the 124 globin promoter methylations 125 Pyrosequencing assays of LINE-1 methylation were performed to assess global 126 methylation (19). Procedures are described in Supplementary methods.
Recommended publications
  • The Design of Rijndael: AES - the Advanced Encryption Standard/Joan Daemen, Vincent Rijmen
    Joan Daernen · Vincent Rijrnen Theof Design Rijndael AES - The Advanced Encryption Standard With 48 Figures and 17 Tables Springer Berlin Heidelberg New York Barcelona Hong Kong London Milan Paris Springer TnL-1Jn Joan Daemen Foreword Proton World International (PWI) Zweefvliegtuigstraat 10 1130 Brussels, Belgium Vincent Rijmen Cryptomathic NV Lei Sa 3000 Leuven, Belgium Rijndael was the surprise winner of the contest for the new Advanced En­ cryption Standard (AES) for the United States. This contest was organized and run by the National Institute for Standards and Technology (NIST) be­ ginning in January 1997; Rij ndael was announced as the winner in October 2000. It was the "surprise winner" because many observers (and even some participants) expressed scepticism that the U.S. government would adopt as Library of Congress Cataloging-in-Publication Data an encryption standard any algorithm that was not designed by U.S. citizens. Daemen, Joan, 1965- Yet NIST ran an open, international, selection process that should serve The design of Rijndael: AES - The Advanced Encryption Standard/Joan Daemen, Vincent Rijmen. as model for other standards organizations. For example, NIST held their p.cm. Includes bibliographical references and index. 1999 AES meeting in Rome, Italy. The five finalist algorithms were designed ISBN 3540425802 (alk. paper) . .. by teams from all over the world. 1. Computer security - Passwords. 2. Data encryption (Computer sCIence) I. RIJmen, In the end, the elegance, efficiency, security, and principled design of Vincent, 1970- II. Title Rijndael won the day for its two Belgian designers, Joan Daemen and Vincent QA76.9.A25 D32 2001 Rijmen, over the competing finalist designs from RSA, IBl\!I, Counterpane 2001049851 005.8-dc21 Systems, and an English/Israeli/Danish team.
    [Show full text]
  • MERGING+ANUBIS User Manual
    USER MANUAL V27.09.2021 2 Contents Thank you for purchasing MERGING+ANUBIS ........................................................................................... 6 Important Safety and Installation Instructions ........................................................................................... 7 Product Regulatory Compliance .................................................................................................................... 9 MERGING+ANUBIS Warranty Information................................................................................................ 11 INTRODUCTION .............................................................................................................................................. 12 Package Content ........................................................................................................................................ 12 OVERVIEW ................................................................................................................................................... 13 MERGING+ANUBIS VARIANTS AND KEY FEATURES ........................................................................ 13 ABOUT RAVENNA ...................................................................................................................................... 16 MISSION CONTROL - MODULAR BY SOFTWARE ............................................................................... 16 MERGING+ANUBIS panels description ....................................................................................................
    [Show full text]
  • Optimization of AES Encryption Algorithm with S- Box
    International Journal of Engineering Research and Technology. ISSN 0974-3154 Volume 6, Number 2 (2013), pp. 259-268 © International Research Publication House http://www.irphouse.com Optimization of AES Encryption Algorithm with S- Box Dr. J. Abdul Jaleel1, Anu Assis2 and Sherla A.3 Dept. Of Electrical and Electronics Engineering1,3, Dept. Of Electronics and Communication2 [email protected], [email protected] [email protected] Abstract In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data. These algorithms are used to ensure the security in the transmission channels. Similarly hardware utilization and power consumption are another major things to be considered since most of the mobile terminals are battery operated. In this paper, we use the Advanced Encryption Standard (AES) which works on a 128 bit data encrypting it with 128, 192 or 256 bits of keys for ensuring security. In this paper, we compare AES encryption with two different S-Boxes: S-box with 256 byte lookup table (Rijndael S-Box) and AES with 16 byte S-Box (Anubis S-Box). Optimized and synthesized VHDL code is used for AES encryption. Xilinx ISE 13.2i software is used for VHDL code implementation and Modelsim simulator is used for the simulation. Keywords: AES(Advanced Encryption Standard ), Rijndael, Cryptography, VHDL. Introduction As we move into twenty-first century, almost all information processing and telecommunication are in digital formats. In any wireless communication, security is crucial during data transmission. The encryption and decryption of data is the major challenge faced in the wireless communication for security of the data.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Cryptanalysis of Feistel Networks with Secret Round Functions ⋆
    Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1, Gaëtan Leurent2, and Léo Perrin3 1 [email protected], University of Luxembourg 2 [email protected], Inria, France 3 [email protected], SnT,University of Luxembourg Abstract. Generic distinguishers against Feistel Network with up to 5 rounds exist in the regular setting and up to 6 rounds in a multi-key setting. We present new cryptanalyses against Feistel Networks with 5, 6 and 7 rounds which are not simply distinguishers but actually recover completely the unknown Feistel functions. When an exclusive-or is used to combine the output of the round function with the other branch, we use the so-called yoyo game which we improved using a heuristic based on particular cycle structures. The complexity of a complete recovery is equivalent to O(22n) encryptions where n is the branch size. This attack can be used against 6- and 7-round Feistel n−1 n Networks in time respectively O(2n2 +2n) and O(2n2 +2n). However when modular addition is used, this attack does not work. In this case, we use an optimized guess-and-determine strategy to attack 5 rounds 3n=4 with complexity O(2n2 ). Our results are, to the best of our knowledge, the first recovery attacks against generic 5-, 6- and 7-round Feistel Networks. Keywords: Feistel Network, Yoyo, Generic Attack, Guess-and-determine 1 Introduction The design of block ciphers is a well researched area. An overwhelming majority of modern block ciphers fall in one of two categories: Substitution-Permutation Networks (SPN) and Feistel Networks (FN).
    [Show full text]
  • Design and Analysis of Lightweight Block Ciphers : a Focus on the Linear
    Design and Analysis of Lightweight Block Ciphers: A Focus on the Linear Layer Christof Beierle Doctoral Dissertation Faculty of Mathematics Ruhr-Universit¨atBochum December 2017 Design and Analysis of Lightweight Block Ciphers: A Focus on the Linear Layer vorgelegt von Christof Beierle Dissertation zur Erlangung des Doktorgrades der Naturwissenschaften an der Fakult¨atf¨urMathematik der Ruhr-Universit¨atBochum Dezember 2017 First reviewer: Prof. Dr. Gregor Leander Second reviewer: Prof. Dr. Alexander May Date of oral examination: February 9, 2018 Abstract Lots of cryptographic schemes are based on block ciphers. Formally, a block cipher can be defined as a family of permutations on a finite binary vector space. A majority of modern constructions is based on the alternation of a nonlinear and a linear operation. The scope of this work is to study the linear operation with regard to optimized efficiency and necessary security requirements. Our main topics are • the problem of efficiently implementing multiplication with fixed elements in finite fields of characteristic two. • a method for finding optimal alternatives for the ShiftRows operation in AES-like ciphers. • the tweakable block ciphers Skinny and Mantis. • the effect of the choice of the linear operation and the round constants with regard to the resistance against invariant attacks. • the derivation of a security argument for the block cipher Simon that does not rely on computer-aided methods. Zusammenfassung Viele kryptographische Verfahren basieren auf Blockchiffren. Formal kann eine Blockchiffre als eine Familie von Permutationen auf einem endlichen bin¨arenVek- torraum definiert werden. Eine Vielzahl moderner Konstruktionen basiert auf der wechselseitigen Anwendung von nicht-linearen und linearen Abbildungen.
    [Show full text]
  • Cryptanalysis of Ciphers and Protocols Elad Pinhas Barkan
    Cryptanalysis of Ciphers and Protocols Elad Pinhas Barkan Technion - Computer Science Department - Ph.D. Thesis PHD-2006-04 - 2006 Technion - Computer Science Department - Ph.D. Thesis PHD-2006-04 - 2006 Cryptanalysis of Ciphers and Protocols Research Thesis Submitted in partial fulfillment of the Requirements for the Degree of Doctor of Philosophy Elad Pinhas Barkan Submitted to the Senate of the Technion — Israel Institute of Technology Adar 5766 Haifa March 2006 Technion - Computer Science Department - Ph.D. Thesis PHD-2006-04 - 2006 Technion - Computer Science Department - Ph.D. Thesis PHD-2006-04 - 2006 The research thesis was done under the supervision of Prof. Eli Biham in the Faculty of Computer Science. It is my privilege to thank Eli Biham for his insightful support that made this work possible, and for bringing me up as a scientist and researcher. I especially acknowledge Eli for his respect and trust, and for providing me with a very high degree of independence. Eli found the golden path among education, rigorousness, and care. His unique ability to quickly communicate anything in a personal (and sometimes playful) way always leaves me with a smile on my face. I am thankful to Adi Shamir for our fruitful collaboration, for being highly avail- able around the clock (and around the globe), and for his patience and his wisdom. I acknowledge Nathan Keller for his wonderful and helpful curiosity, and for being an amazing brainmaker. It is a pleasure to thank my colleagues at the Technion, Orr Dunkelman and Rafi Chen, for fruitful discussions and for the wonderful time we had together.
    [Show full text]
  • Cerberus.Pdf
    (lP,IIP,U' By Gaynor Borade Greek mythology comprises a huge pantheon, extensive use of anthropomorphism and mythical creatures that ore symbotic. Cerberus, the three headed dog was believed to be the guardian of the reotm of death, or Hades. Cerberus, it was believed, prevented those who crossed the river of death, Styx, from escoping. River Styx was supposed to be the boundory belween the Underworld and Earth. Greek mythology propounded thot Hodes or ihe Underworld wos encircled nine times by River Styx and thot the rivers Phlegethon, Cocytus, Lelhe, Eridanos and Acheron converged with Styx on the 'Great Marsh'. Cerberus guorded the Great Marsh. Importance of Styx in Greek Mythotogy: Hades ond Persephone were believed to be the mortol portals in the Underworld. This reotm wos atso home to Phlegyos or guardian of the River Phlegethon, Charon or Kharon, the ferrymon, ond the living waters of Styx. Styx wos believed to have miraculous powers thot could make o person immorfol, resulting in the grove need for it to be guorded. This reolm relates to the concept of 'hel[' in Christianity and the 'Paradise losf', in the Iiterary genius of 'The Divine Comedy'. In Greek myihology, the ferrymon Charon was in charge of iransporting souls across the Styx, into the Underworld. Here, it was believed thaf the sullen were drowned in Sfyx's muddy waters. Cerberus:The Guardion Cerberus, the mythical guordian of River Styx has been immorlalized through many works of ancient Greek liferoture, ort ond orchitecture. Cerberus is easity recognizabte among the other members of the pontheon due to his three heads.
    [Show full text]
  • Statistical Cryptanalysis of Block Ciphers
    STATISTICAL CRYPTANALYSIS OF BLOCK CIPHERS THÈSE NO 3179 (2005) PRÉSENTÉE À LA FACULTÉ INFORMATIQUE ET COMMUNICATIONS Institut de systèmes de communication SECTION DES SYSTÈMES DE COMMUNICATION ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR Pascal JUNOD ingénieur informaticien dilpômé EPF de nationalité suisse et originaire de Sainte-Croix (VD) acceptée sur proposition du jury: Prof. S. Vaudenay, directeur de thèse Prof. J. Massey, rapporteur Prof. W. Meier, rapporteur Prof. S. Morgenthaler, rapporteur Prof. J. Stern, rapporteur Lausanne, EPFL 2005 to Mimi and Chlo´e Acknowledgments First of all, I would like to warmly thank my supervisor, Prof. Serge Vaude- nay, for having given to me such a wonderful opportunity to perform research in a friendly environment, and for having been the perfect supervisor that every PhD would dream of. I am also very grateful to the president of the jury, Prof. Emre Telatar, and to the reviewers Prof. em. James L. Massey, Prof. Jacques Stern, Prof. Willi Meier, and Prof. Stephan Morgenthaler for having accepted to be part of the jury and for having invested such a lot of time for reviewing this thesis. I would like to express my gratitude to all my (former and current) col- leagues at LASEC for their support and for their friendship: Gildas Avoine, Thomas Baign`eres, Nenad Buncic, Brice Canvel, Martine Corval, Matthieu Finiasz, Yi Lu, Jean Monnerat, Philippe Oechslin, and John Pliam. With- out them, the EPFL (and the crypto) would not be so fun! Without their support, trust and encouragement, the last part of this thesis, FOX, would certainly not be born: I owe to MediaCrypt AG, espe- cially to Ralf Kastmann and Richard Straub many, many, many hours of interesting work.
    [Show full text]
  • Hardware Performance Characterization of Block Cipher Structures∗
    Hardware Performance Characterization of Block Cipher Structures∗ Lu Xiao and Howard M. Heys Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland St. John's, NF, Canada A1B 3X5 fxiao, [email protected] Abstract In this paper, we present a general framework for evaluating the performance char- acteristics of block cipher structures composed of S-boxes and Maximum Distance Sep- arable (MDS) mappings. In particular, we examine nested Substitution-Permutation Networks (SPNs) and Feistel networks with round functions composed of S-boxes and MDS mappings. Within each cipher structure, many cases are considered based on two types of S-boxes (i.e., 4×4 and 8×8) and parameterized MDS mappings. In our study of each case, the hardware complexity and performance are analyzed. Cipher security, in the form of resistance to differential, linear, and Square attacks, is used to deter- mine the minimum number of rounds required for a particular parameterized structure. Because the discussed structures are similar to many existing ciphers (e.g., Rijndael, Camellia, Hierocrypt, and Anubis), the analysis provides a meaningful mechanism for seeking efficient ciphers through a wide comparison of performance, complexity, and security. 1 Introduction In product ciphers like DES [1] and Rijndael [2], the concepts of confusion and diffusion are vital to security. The Feistel network and the Substitution-Permutation Network (SPN) are two typical architectures to achieve this. In both architectures, Substitution-boxes (S- boxes) are typically used to perform substitution on small sub-blocks. An S-box is a nonlinear mapping from input bits to output bits, which meets many security requirements.
    [Show full text]
  • Constructions of Involutions Over Finite Fields
    Constructions of involutions over finite fields Dabin Zheng1 Mu Yuan1 Nian Li1 Lei Hu2 Xiangyong Zeng1 1 Hubei Key Laboratory of Applied Mathematics, Faculty of Mathematics and Statistics, Hubei University, Wuhan 430062, China 2 Institute of Information Engineering, CAS, Beijing 100093, China Abstract An involution over finite fields is a permutation polynomial whose inverse is itself. Owing to this property, involutions over finite fields have been widely used in applications such as cryptography and coding theory. As far as we know, there are not many involutions, and there isn’t a general way to construct involutions over finite fields. This paper gives a necessary and sufficient condition for the r s polynomials of the form x h(x ) ∈ Fq[x] to be involutions over the finite field Fq, where r ≥ 1 and s | (q − 1). By using this criterion we propose a general method r s to construct involutions of the form x h(x ) over Fq from given involutions over F∗ the corresponding subgroup of q . Then, many classes of explicit involutions of r s the form x h(x ) over Fq are obtained. Key Words permutation polynomial, involution, block cipher 1 Introduction F F∗ Let q be a power of a prime. Let q be a finite field with q elements and q de- note its multiplicative group. A polynomial f(x) ∈ Fq[x] is called a permutation polynomial if its associated polynomial mapping f : c 7→ f(c) from Fq to itself is a bijection. Moreover, f is called an involution if the compositional inverse of f is itself.
    [Show full text]
  • Pharaoh's Scribe
    June 2020 Pharaoh’s Scribe The Newsletter of the Pharaoh Hound Club of America In this issue: Page 2 President’s Message Page 6 New Members Page 9 AKC News Page 15 CODE of ETHICS Page 23 & 28 AKC Titles Page 24 Points Schedule Page 31 Memorable Page 33 Financial Report Page 35 Candids Her courage was her crown, and she wore it like a Queen. The PHARAOHS SCRIBE is the official newsletter of the Pharaoh Hound Club of America, Inc. and is published four (4) times a year on a quarterly basis. The opinions within are those of the writers and do not necessarily represent the views of the PHCA. This publication is available to members in good standing of the Pharaoh Hound Club of America only. Pharaoh Scribe June 2020 President’s Message Hello All: I hope you and yours are doing well. As many of you know, there were some lengthy discussions regarding the 2020 PHCA National and Eastern Regional Specialties. The conversation was at times heated and not always nice, productive or constructive. It did, however, provide us - and by that I mean the collective "us" - both the Board of Directors and the membership - with some lessons that we can take away from the entire unfortunate situation. First of all, we shouldn't ALWAYS assume we know the motives behind the other side in a disagreement. If uncertain, we should ask those questions that are nagging at us or that we find suspect, instead of attributing the worst possible motive and running with it. Secondly, we should ALL remain open to communications - once one side assumes a position or draws the proverbial "line in the sand" any effective opportunity for further communication or compromise has been lost.
    [Show full text]