Skip to main content
Log in

Controlled elements for designing ciphers suitable to efficient VLSI implementation

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO) for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations (DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding enhancement of the “performance per cost” value and retaining security at the level of indistinguishability from a random transformation. To obtain further enhancement of this parameter a new crypto-scheme based on the advanced DDOs is proposed. The FPGA implementation of the proposed crypto-scheme achieves higher throughput value and minimizes the allocated resources than the conventional designs. Design of the DDO boxes of different orders is considered and their ASIC implementation is estimated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. A.A. Waksman, Permutation Network, Journal of the ACM 15 (1968) 159–163.

    Article  Google Scholar 

  2. D.S. Parker, Notes on shuffle/exchange-type switching networks, IEEE Transactions on computers C-29(3) (1980) 213–222.

    Google Scholar 

  3. M. Portz, A generallized description of DES-based and Benes-based permutation generators, Springer-Verlag LNCS 718 (1992) 397–409.

    Google Scholar 

  4. M. Kwan, The design of the ICE encryption algorithm, Springer-Verlag LNCS 1267 (1997) 69–82.

    Google Scholar 

  5. B. Van Rompay, L.R. Knudsen, and V. Rijmen, Differential cryptanalysis of the ICE encryption algorithm, Springer-Verlag LNCS 1372 (1998) 270–283.

    Google Scholar 

  6. R.L. Rivest, The RC5 Encryption Algorithm, Springer-Verlag LNCS 1008 (1995) 86–96.

    Google Scholar 

  7. R.L. Rivest, M.J.B. Robshaw, R. Sidney, and Y.L. Yin, The RC6 Block Cipher, 1st Advanced Encryption Standard Candidate Conference Proceedings, Venture, California, Aug. 20–22, 1998.

  8. J. Pieprzyk, Th. Hardjono, and J. Seberry, Fundumentals of Computer Security. Springer-verlag. Berlin (2003) 677.

    Google Scholar 

  9. C. Burwick, D. Coppersmith, E. D'Avingnon, R. Gennaro, Sh. Halevi, Ch. Jutla, Jr. S.M. Matyas, L. O'Connor, M. Peyravian, D. Safford, and N. Zunic, MARS—-a Candidate Cipher for AES, 1st Advanced Encryption Standard Candidate Conference Proceedings, Venture, California, Aug. 20–22, 1998.

  10. A.A. Moldovyan and N.A. Moldovyan, A cipher based on data-dependent permutations, Journal of Cryptology 15 (2002) 61–72.

    Google Scholar 

  11. N.D. Goots, B.V. Izotov, A.A. Moldovyan, and A.N. Moldovyan, Fast Ciphers for Cheap Hardware: Differential Analysis of SPECTR-H64, Springer-Verlag LNCS 2776 (2003) 449–452.

    Google Scholar 

  12. N.A. Moldovyan, Fast DDP-Based Ciphers: Design and Differential Analysis of Cobra-H64, Computer Science Journal of Moldova 11(3) (2003) 292–315.

    Google Scholar 

  13. N. Sklavos, N.A. Moldovyan, O. Koufopavlou, High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers, Mobile Networks and Applications 10 (2005) 237–249.

    Article  Google Scholar 

  14. Z.J. Shi and R.B. Lee, Bit permutation Instructions for Fast Software Cryptography, Proceedings of the IEEEInternational Conference on Application-specific Systems, Architecture and processors, Boston, Massachusetts, USA, (July 10-12, 2000) pp. 138–148.

  15. R.B. Lee, Z.J. Shi, and X. Yang, Efficient permutation instructions for Fast Software Cryptography, IEEE Micro 21(6) (2001) 56–69.

    Article  Google Scholar 

  16. R.B. Lee, Z.J. Shi, R.L. Rivest, and M.J.B. Robshaw, On permutation operations in Cipher Design, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), Las Vegas, Nevada April 5–7 (2004) vol. 2 pp. 569–579.

  17. N.A. Moldovyan, N.D. Goots, P.A. Moldovyanu, and D.H. Summerville, Fast DDP-Based Ciphers: from Hardware to Software, Proceedings of the 46th IEEE symposium “Midwest 2003”, Egypt, Cairo (December 26–29, 2003).

  18. B. Preneel et al., Comments by the NESSIE project on the AES finalists. May 24, 2000 http://www.nist.gav/aes

  19. Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee, Hyungjin Yang, and Jongin Lim, A chosen plaintext linear attack on block cipher CIKS-1, Springer-Verlag LNCS 2513 (2003) 456–468.

    Google Scholar 

  20. N.A. Moldovyan, A.A. Moldovyan, and N.D. Goots, Variable Bit Permutations: Linear Characteristics and Pure VBP-Based Cipher, Computer Science Journal of Moldova 13 (2005) 84–109.

    Google Scholar 

  21. Youngdai Ko, Deukjo Hong, Seokhie Hong, Sangjin Lee, and Jongin Lim, Linear Cryptanalysis on SPECTR-H64 with Higher Order Differential Property, Springer Verlag LNCS 2776 (2003) 298–307.

    Google Scholar 

  22. N.A. Moldovyan, On Cipher Design Based on Switchable Controlled Operations, Springer-Verlag LNCS 2776 (2003) 316–327.

    Google Scholar 

  23. N. Sklavos, A.A. Moldovyan, and O. Koufopavlou, Encryption and Data Dependent Permutations: Implementation Cost and Performance Evaluation, Springer-Verlag LNCS 2776 (2003) 337–348.

    Google Scholar 

  24. A. J. Elbirt, W. Yip, B. Ghetwynd, and C. Paar, An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists, 3rd Advanced Encryption Standard Conference Proceedings, New York, NY, USA http://www.nist.gov/aes(April 13-14, 2000).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. A. Moldovyan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Moldovyan, A.A., Moldovyan, N.A. & Sklavos, N. Controlled elements for designing ciphers suitable to efficient VLSI implementation. Telecommun Syst 32, 149–163 (2006). https://doi.org/10.1007/s11235-006-9135-5

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-006-9135-5

Keywords

Navigation