Some evaluations for involutory diffusion layer of 64-bit AES-like block ciphers based on the hadamard matrices

08:00 | 12/08/2019 | GP MẬT MÃ
Abstract - In this paper, we classify and evaluate the involutory diffusion layer of 64-bit AES-like block ciphers based on the Hadamard matrices. Firstly, we calculate the number of fixed points in this layer. After that, we perform a practical investigation on the 4×4-bit Hadamard matrices in GF(2^4) and modify the number of XOR gates used to implement as described in [9] to choose a suitable matrix for constructing the involutory diffusion layer of AES-like block ciphers with 64-bit block size.

Tóm tắt - Trong bài báo này, chúng tôi phân loại và đánh giá các tầng khuếch tán cuộn của mã khối 64-bit tựa AES dựa trên các ma trận Hadamard. Đầu tiên, chúng tôi tính toán số lượng các điểm cố định trong lớp này. Sau đó, chúng tôi thực hiện một cuộc khảo sát thực tế trên các ma trận Hadamard 4×4-bit trong GF(2^4) và thay đổi các số cổng XOR được sử dụng để cài đặt như mô tả trong [9] nhằm chọn ra một ma trận phù hợp để xây dựng các tầng khuếch tán cuộn của mã khối tựa AES với kích thước khối 64-bit.
Xem toàn bộ bài báo tại đây.

REFERENCES

[1]. Daemen J, Rijmen V, “The Design of Rijndael, AES” - The Advanced Encryption Standard. Springer-Verlag, 2002.

[2]. Z'aba MR, “Analysis of linear relationships in block ciphers”. Ph.D. Thesis, Queensland University of Technology, Brisbane, Australia, 2010.

[3]. Kishan Chand Gupta and Indranil Ghosh Ray, “On Constructions of MDS Matrices form Companion Matrices for Lightweight Cryptography”. Security Engineering and Intelligence Informatics, volume 8128, pp. 29-43, 2013.

[4]. Jian Guo, Thomas Peyrin, Axel Poschmann, and Matthew J. B. Robshaw, “The LED block cipher”. In CHES 2011, vol. 6917, pp. 326-341, 2011.

[5]. Jian Guo, Thomas Peyrin and Axel Poschmann, “The PHOTON Family of lightweight Hash Functions”. In CRYPTO, Springer, pp. 222-239, 2011.

[6]. ГОСТ Р 34.11-2012. “Криптографическая защита информации” – Функция хэширования. Издание официальное, Москва 2012.

[7]. M. Sajadieh, M. Dakhilalian, H. Mala, B. Omoomi, “On construction of involutory MDS matrices from Vandermonde Matrices in GF(2q)”. Design, Codes Cryptography, pp. 1-22, 2012.

[8]. Youssef, A. M., Mister, S., Tavares, S.E, “On the Design of Linear Transformations for Substitution Permutation Encryption Networks”. In: Workshop on Selected Areas in Cryptography, SAC 1997, pp. 40-48.

[9]. Sim, Siang Meng, et al, "Lightweight MDS Involution Matrices." Fast Software Encryption (FSE), 2015.

[10]. Kishan Chand Gupta and Indranil Ghosh Ray. “On Constructions of Involutory MDS Matrices”. AFRICACRYPT 2013, LNCS 7818, pp. 43-60, 2013.

[11]. Joan Daemen, Vincent Rijmen, “The Wide Trail Design Strategy”. IMA Int. Conf, pp. 222-238, 2001.

[12]. Brumley, Billy Bob, “Secure and fast implementations of two involution ciphers”. Information Security Technology for Applications. Springer Berlin Heidelberg, pp. 269-282, 2012.

[13]. Borghoff, Julia, et al, “PRINCE–a low-latency block cipher for pervasive computing applications”. Advances in Cryptology–ASIACRYPT 2012. Springer Berlin Heidelberg, pp. 208-225, 2012.

[14]. Kishan Chand Gupta and Indranil Ghosh Ray, “On Constructions of MDS Matrices form Companion Matrices for Lightweight Cryptography”. Security Engineering and Intelligence Informatics, vol. 8128, pp. 29-43, 2013.

[15]. Khoo, Khoongming, et al, “FOAM: Sear-ching for Hardware-Optimal SPN Structures and Components with a Fair Comparison”. Cryptographic Hardware and Embedded Systems-CHES 2014. Springer Berlin Heidelberg, pp. 433-450, 2014.

[16]. Nguyen Van Long, Tran Duy Lai, Nguyen Bui Cuong. “Some evaluations for a replacement of shitfrows operator in AES-like ciphers”, Journal of Science and Technology Military, 2015 (Vietnamese). 

Thông tin trích dẫn: Lai Tran Duy, Long Nguyen Van, Cuong Nguyen Bui, “Some evaluations for involutory diffusion layer of 64-bit AES-like block ciphers based on the hadamard matrices”, Journal of Science and Technology on Information security, Information Security Journal, Vol.02, No.01, pp. 25-31, 2016.

Lai Tran Duy, Long Nguyen Van, Cuong Nguyen Bui

Tin cùng chuyên mục

Tin mới