An efficient permutation approach for SbPN-based symmetric block ciphers
Tóm tắt
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices. Therefore, an efficient hardware design approach that requires some specific hardware resource may not be efficient if implemented in software. Substitution bit Permutation Network based ciphers such as PRESENT and GIFT are efficient, lightweight cryptographic hardware design approaches. These ciphers introduce confusion and diffusion by employing a 4 × 4 static substitution box and bit permutations. The bit-wise permutation is realised by simple rerouting, which is most cost-effective to implement in hardware, resulting in negligible power consumption. However, this method is highly resource-consuming in software, particularly for large block-sized ciphers, with each single-bit permutation requiring multiple sub-operations. This paper proposes a novel software-based design approach for permutation operation in Substitution bit Permutation Network based ciphers using a bit-banding feature. The conventional permutation using bit rotation and the proposed approach have been implemented, analysed and compared for GIFT and PRESENT ciphers on ARM Cortex-M3-based LPC1768 development platform with KEIL MDK used as an Integrated Development Environment. The real-time performance comparison between conventional and the proposed approaches in terms of memory (RAM/ROM) footprint, power, energy and execution time has been carried out using ULINKpro and ULINKplus debug adapters for various code and speed optimisation scenarios. The proposed approach substantially reduces execution time, energy and power consumption for both PRESENT and GIFT ciphers, thus demonstrating the efficiency of the proposed method for Substitution bit Permutation Network based symmetric block ciphers.
Tài liệu tham khảo
Ashton K (2009) That ‘Internet of Things’ Thing. RFID J 22:97–114
Adomnicai A, Najm Z, Peyrin T (2020) Fixslicing: a new GIFT representation. IACR Trans Cryptogr Hardw Embed Syst 402:427. https://doi.org/10.46586/tches.v2020.i3.402-427
Adomnicai A, Peyrin T (2020) Fixslicing AES-like ciphers. IACR Trans Cryptogr Hardw Embed Syst:402–425
Avik Chakraborti MN, Datta N, Jha A (2019) HyENA, NIST lightweight cryptography project. https://csrc.nist.gov/Projects/Lightweight-Cryptography/Round-1-Candidates
Avik Chakraborti CML, Datta N, Jha A, Mancillas-LopezAvik Chakraborti C, Datta N, Jha A, Mridul Nandi YS (2020) ESTATE: a lightweight and low energy authenticated encryption mode. IACR Trans Symmetric Cryptol:350–389
Avik Chakraborti CML, Datta N, Jha A, Mridul Nandi YS (2019) LOTUS-AEAD and LOCUS-AEAD, Technical report, First-round submission to the NIST Lightweight Cryptography Competition
Bai Y (2015) Practical microcontroller engineering with ARM® technology. Wiley
Banday MT (2018) A study of current trends in the design of processors for the Internet of Things. ACM Int Conf Proc Ser. https://doi.org/10.1145/3231053.3231074
Banik S et al (2015) Midori : a block cipher for low energy ( extended version ). Int Conf Theory Appl Cryptol Inf Secur 9453:411–436
Banik S, Pandey SK, Peyrin T, Sasaki Y, Sim SM, Todo Y (2017) GIFT: a small present. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 10529 LNCS, 2017, pp 321–345
Banik S et al (2019a) Gift-cofb v1.0. NIST lightweight cryptography project. pp 1–30. https://csrc.nist.gov/Projects/lightweight-cryptography/round-2-candidates
Banik S et al (2019b) Sundae-gift. Submiss. to Round 1, vol 1, pp 1–22
Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) Simon and speck: block ciphers for the internet of things. In: Proceedings of the 52nd annual design automation conference on—DAC ’15, no. July. pp 1–6. http://dl.acm.org/citation.cfm?doid=2744769.2747946
Benadjila R, Guo J, Lomné V, Peyrin T (2014) Implementing lightweight block ciphers on x86 architectures. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 8282 LNCS, pp 324–351
Biham E (1997) A fast new DES implementation in software. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 1267, pp 260–272
Biham E, Anderson R, Knudsen L (1998) Serpent: a new block cipher proposal. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 1372, pp 222–238
Biryukov A, Cannière C (2006) Data encryption standard (DES). Encycloped Cryptogr Secur 3:129–135
Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A (2007) PRESENT : an ultra-lightweight block cipher. Cryptogr Hardw Embed Syst 2007:10–13
Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A (2007) PRESENT : an ultra-lightweight block cipher. In: Proc. 9th international workshop on cryptographic hardware and embedded systems (CHES 2007), Vienna, Austria, pp 450–466
Borghoff J et al (2012) PRINCE: a low-latency block cipher for pervasive computing applications. Lect Not Comput Sci Inlude Subser Lect Not Artif Intell Lect Not Bioinform 7658(10):208–225. https://doi.org/10.1007/978-3-642-34961-4_14
Boyar J, Peralta R (2010) A new combinational logic minimization technique with applications to cryptology. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 6049 LNCS, no 2, pp 178–189
Dinu D, Le Corre Y, Khovratovich D, Perrin L, Großschädl J, Biryukov A (2019) Triathlon of lightweight block ciphers for the Internet of things. J Cryptogr Eng 9(3):283–302. https://doi.org/10.1007/s13389-018-0193-x
Forouzan D, Behrouz A, Mukhopadhyay D (2015) Cryptography and network security. Mc Graw Hill Education (India) Private Limited New York, NY, USA
Heys HM (2020) A tutorial on the implementation of block ciphers: software and hardware applications. In: IACR Cryptol. ePrint Arch, p 1545. https://eprint.iacr.org/2020/1545
Karakoç F, Demirci H, Harmanci AE (2013) ITUbee: a software oriented lightweight block cipher. Lect Not Comput Sci 8162:16–27. https://doi.org/10.1007/978-3-642-40392-7_2
Kim H et al (2022) SPEEDY on Cortex–M3: efficient software implementation of SPEEDY on ARM Cortex–M3. Lect Notes Comput Sci 13218:434–444. https://doi.org/10.1007/978-3-031-08896-4_23
Kwan M (2000) Reducing the gate count of Bitslice DES. IACR Cryptol. ePrint Arch., vol. 2000, p 51. http://dblp.uni-trier.de/db/journals/iacr/iacr2000.html#Kwan00
Lee RB (1989) Precision architecture. Comput Long Beach Calif 22(1):78–91. https://doi.org/10.1109/2.19825
Matsui M, Nakajima J (2007) On the power of bitslice implementation on intel core2 processor. In: Cryptographic hardware and embedded systems: CHES 2007, vol. 4727 LNCS, Berlin, Heidelberg: Springer Berlin Heidelberg, pp 121–134
Nazish M, Banday MT (2018) Green Internet of Things: a study of technologies, challenges and applications. In: 2018 international conference on automation and computational engineering (ICACE), pp 210–215. https://doi.org/10.1109/ICACE.2018.8686976
Papapagiannopoulos K (2014) Radio Frequency identification: security and privacy issues, vol 8651. Springer, Cham
Poschmann A (2009) Lightweight cryptography: cryptographic engineering for a pervasive world. Ph. D. Thesis, no. February, pp 1–197. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.182.1450
Reis TBS, Aranha DF, López J (2017) PRESENT runs fast: efficient and secure implementation in software. Lect Not Comput Sci 10529:644–664. https://doi.org/10.1007/978-3-319-66787-4_31
Rejeb A, Rejeb K, Simske S, Treiblmaier H, Zailani S (2022) The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet Things 19:100565. https://doi.org/10.1016/j.iot.2022.100565
Rouf M, Nazish M, Sultan I, Banday MT (2022) Implementation of area and power optimised ARM cortex-M cores on FPGA. In: 2022 smart technologies, communication and robotics (STCR), pp 1–6. https://doi.org/10.1109/STCR55312.2022.10009282
Schwabe P, Stoffelen K (2017) All the AES you need on cortex-M3 and M4. In: Lecture Notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 10532 LNCS, pp 180–194
Shannon CE (1945) A mathematical theory of cryptography. https://www.iacr.org/museum/shannon45.html
Tahir M, Javed K (2017) ARM microprocessor systems cortex-M architecture, programming, and interfacing. CRC Press
Yiu J (2014) The definitive guide to ARM Cortex-M3 and cortex-M4 processors. 3rd edition. Newnes, Cambridge, pp 45–55, vol 4, no 1. Elsevier
Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2015) RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci. https://doi.org/10.1007/s11432-015-5459-7