An efficient permutation approach for SbPN-based symmetric block ciphers

被引:1
|
作者
Nazish, Mir [1 ]
Banday, M. Tariq [1 ]
Syed, Insha [1 ]
Banday, Sheena [1 ]
机构
[1] Univ Kashmir, Dept Elect & Instrumentat Technol, Srinagar 190006, India
关键词
Lightweight cryptography; PRESENT; GIFT; SbPN; Cortex-M; LPC1768; Bit-band memory; LIGHTWEIGHT; IMPLEMENTATION;
D O I
10.1186/s42400-023-00174-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices. Therefore, an efficient hardware design approach that requires some specific hardware resource may not be efficient if implemented in software. Substitution bit Permutation Network based ciphers such as PRESENT and GIFT are efficient, lightweight cryptographic hardware design approaches. These ciphers introduce confusion and diffusion by employing a 4 x 4 static substitution box and bit permutations. The bit-wise permutation is realised by simple rerouting, which is most cost-effective to implement in hardware, resulting in negligible power consumption. However, this method is highly resource-consuming in software, particularly for large block-sized ciphers, with each single-bit permutation requiring multiple sub-operations. This paper proposes a novel software-based design approach for permutation operation in Substitution bit Permutation Network based ciphers using a bit-banding feature. The conventional permutation using bit rotation and the proposed approach have been implemented, analysed and compared for GIFT and PRESENT ciphers on ARM Cortex-M3-based LPC1768 development platform with KEIL MDK used as an Integrated Development Environment. The real-time performance comparison between conventional and the proposed approaches in terms of memory (RAM/ROM) footprint, power, energy and execution time has been carried out using ULINKpro and ULINKplus debug adapters for various code and speed optimisation scenarios. The proposed approach substantially reduces execution time, energy and power consumption for both PRESENT and GIFT ciphers, thus demonstrating the efficiency of the proposed method for Substitution bit Permutation Network based symmetric block ciphers.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Designing against a class of algebraic attacks on symmetric block ciphers
    Adams, C
    APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2006, 17 (01) : 17 - 27
  • [22] Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms
    Dworak, Kamil
    Boryczka, Urszula
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS, ACIIDS 2019, PT II, 2019, 11432 : 275 - 286
  • [23] Designing against a class of algebraic attacks on symmetric block ciphers
    Carlisle Adams
    Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 17 - 27
  • [24] New Approach in Creating of Block Ciphers Based on Wavelet Decomposition of Splines
    Levina, Alla
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2011, VOL I, 2011, : 123 - 126
  • [25] YuX: Finite Field Multiplication Based Block Ciphers for Efficient FHE Evaluation
    Liu, Fen
    Li, Yongqiang
    Chen, Huiqin
    Jiao, Lin
    Luo, Ming
    Wang, Mingsheng
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (05) : 3729 - 3749
  • [26] Tabu Search Against Permutation Based Stream Ciphers
    Polak, Iwona
    Boryczka, Mariusz
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2018, 64 (02) : 137 - 145
  • [27] The Stream Ciphers and the Keystream Generator Based on Inverse Permutation
    Scholtz, Vladimir
    Scholtzova, J.
    10TH IFAC WORKSHOP ON PROGRAMMABLE DEVICES AND EMBEDDED SYSTEMS (PDES 2010), 2010, : 7 - 10
  • [28] A New Approach to χ2 Cryptanalysis of Block Ciphers
    Nakahara, Jorge, Jr.
    Sekar, Gautham
    de Freitas, Daniel Santana
    Chiann, Chang
    de Souza, Ramon Hugo
    Preneel, Bart
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 1 - +
  • [29] Attacks of simple block ciphers via efficient heuristics
    Nalini, N.
    Rao, G. Raghavendra
    INFORMATION SCIENCES, 2007, 177 (12) : 2553 - 2569
  • [30] On the security of symmetric ciphers based on DNA coding
    Zhang, Yushu
    Xiao, Di
    Wen, Wenying
    Wong, Kwok-Wo
    INFORMATION SCIENCES, 2014, 289 : 254 - 261