تعداد نشریات | 31 |
تعداد شمارهها | 705 |
تعداد مقالات | 6,885 |
تعداد مشاهده مقاله | 11,260,984 |
تعداد دریافت فایل اصل مقاله | 7,555,515 |
Lightweight Structure of Random Key Generation for PRESENT Block Cipher | ||
International Journal of Industrial Electronics Control and Optimization | ||
مقاله 4، دوره 7، شماره 1، خرداد 2024، صفحه 41-51 اصل مقاله (808.8 K) | ||
نوع مقاله: Research Articles | ||
شناسه دیجیتال (DOI): 10.22111/ieco.2024.47375.1511 | ||
نویسنده | ||
Bahram Rashidi* | ||
Dept. of Elec. Eng., Ayatollah Boroujerdi University | ||
چکیده | ||
In this paper, we design a lightweight and modified random key generation for PRESENT block cipher which is applicable in the encryption of the digital signals. In the block ciphers, the master key is used directly in the encryption process for the data (plaintext). But in this work, a master key (initial key) is used to derive the new random master keys (random session keys) and use these keys for the encryption process. The use of random keys will overcome the brute force attack that can be applied to the PRESENT cipher. The random session keys generated will produce different ciphertexts for the same plaintext for every session. In this approach, we take advantage of the block cipher to produce random keys. The PRESENT cipher is shared in both random key generation and encryption process. Therefore, the proposed structure has both random key generation and data encryption in a unified circuit. This property reduces hardware resources. The implementation results, in 180 nm CMOS technologies, show the proposed structure is comparable in terms of area and delay with other works. | ||
کلیدواژهها | ||
PRESENT block cipher؛ Random key generation؛ Lightweight؛ High-throughput؛ ASIC | ||
مراجع | ||
[1] Hatzivasilis, G., Fysarakis, K., Papaefstathiou, I. and Manifavas, C., A review of lightweight block ciphers, Journal of Cryptographic Engineering, Vol. 11, Iss. 3, 2018, pp. 141-184.
[2] Sadhukhan, R., Patranabis, S., Ghoshal, A., Mukhopadhyay, D., Saraswat, V. and Ghosh, S., An Evaluation of Lightweight Block Ciphers for Resource-Constrained Applications: Area, Performance, and Security, Journal of Hardware and Systems Security, Vol. 1, Iss. 3, 2017, pp. 203-218. [3] You, L., Yang, E., and Wang, G., A novel parallel image encryption algorithm based on hybrid chaotic maps with OpenCL implementation, Soft Computing, Vol. 24, 2020, pp. 12413-12427. [4] Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin Y. and Vikkelsoe, C., PRESENT: An ultra lightweight block cipher, in Proc. Cryptographic Hardware and Embedded Systems-CHES, Springer, 2007, Vienna, Austria, pp. 450-466. [5] International Standardization of Organization (ISO): Information Technology-Security Techniques-Lightweight Cryptography-Part 2: Block Ciphers, document ISO/IEC 29192-2, Jan. 2012. [6] Rashid, M., Imran, M., Jafri, A.R., Al-Somani, T.F., Flexible Architectures for Cryptographic Algorithms-A Systematic Literature Review, Journal of Circuits, Systems, and Computers, Vol. 24, No. 3, 2018, pp. 1-32. [7] Wang, C., and Heys, H.M., An ultra compact block cipher for serialized architecture implementations, in Proc. Canadian Conference on Electrical and Computer Engineering, 2009, St. John’s, NL, Canada, pp. 1-6. [8] Rolfes, C., Poschmann, A., Leander, G., Paar, C., UltraLightweight Implementations for Smart Devices-Security for 1000 Gate Equivalents, in Proc. International Conference on Smart Card Research and Advanced Applications, Springer, 2008, London, UK, pp. 89-103. [9] Maene, P., and Verbauwhede, I., PRESENT: An ultra lightweight block cipher, in Proc. International Workshop on Lightweight Cryptography for Security and Privacy, 2015, Vol.9542, Bochum, Germany, pp. 131-147. [10] Rekha, S.S., and Saravanan, P., Low Cost Circuit Level Implementation of PRESENT-80 S-BOX, in Proc. International Symposium on VLSI Design and Test, Springer, 2017, Roorkee, India, pp. 354-362. [11] Rashidi, B., Efficient and High-throughput ASIC Implementations of HIGHT and PRESENT Block Ciphers, IET Circuits, Devices & Systems, 2019, Vol. 13, Iss. 6, pp. 731-740. [12] Rashidi, B., Flexible Structures of Lightweight Block Ciphers PRESENT, SIMON and LED, IET Circuits, Devices & Systems, 2020, Vol. 14, Iss. 3, pp. 369-380. [13] Sherine Jenny, R., Sudhakar, R., Karthikpriya, K. Design of Compact S Box for Resource Constrained Applications, Journal of Physics: Conference Series, 2021, Vol. 1767, pp. 1-12. [14] Panchami, V., Mary Mathews, M., A Substitution Box for Lightweight Ciphers to Secure Internet of Things, Journal of King Saud University-Computer and Information Sciences, 2023, Vol. 35, pp. 75-89. [15] Mishra, R., Okade, M., Mahapatra, K., Optimized S-Box Architectures of PRESENT Cipher for Resource Constrained Applications, in Proc. IEEE International Symposium on Smart Electronic Systems, 2020, Chennai, India, pp. 1-4. [16] Parthasarathy, P., Saravanan, Efficient Hardware Implementation of PRESENT Lightweight Cipher, in Proc. International Conference on Intelligent Systems for Communication, IoT and Security, 2023, Coimbatore, India, pp. 1-6. [17] N.Noura, H., Chehab, A., Raphael, C. Efficient & secure cipher scheme with dynamic key-dependent mode of operation, Signal Processing: Image Communication, 2019, Vol. 78, pp. 448-464. [18] Ismail Abdelfatah, R. Secure Image Transmission Using Chaotic-Enhanced Elliptic Curve Cryptography, IEEE Access, 2019, Vol. 8, pp. 3875-3890. [19] Shanthakumari, R. and Malliga, S., Dual layer security of data using LSB inversion image steganography with elliptic curve cryptography encryption algorithm, Multimedia Tools and Applications, 2020, Vol. 79, pp. 3975-3991. [20] Yang, C.H., Wu, H.C., and Su, S.F., Implementation of Encryption Algorithm and Wireless Image Transmission System on FPGA, IEEE Access, 2019, Vol. 7, pp. 50513-50523. [21] Penchalaiah, P., and Ramesh Reddy, K., Random multiple key streams for encryption with added CBC mode of operation, Perspectives in Science, 2016, Vol. 8, pp. 57-60. [22] Montero-Canela, R., Zambrano-Serrano, E., Tamariz-Flores, E.I., Munoz-Pacheco, J.M., and Torrealba-Melendez, R., Fractional chaos based-cryptosystem for generating encryption keys in Ad Hoc networks, Ad Hoc Networks, 2020, Vol. 97, pp. 1-21. [23] Pradeep, L.N., and Bhattacharjya, A., Random Key and Key Dependent S-box Generation for AES Cipher to Overcome Known Attacks, in Proc. International Symposium on Security in Computing and Communication, Springer, 2013, Mysore, India, pp. 63-69. [24] Rashidi, B., Lightweight Cryptographic S-Boxes Based on Efficient Hardware Structures for Block Ciphers, The ISC International Journal of Information Security, Vol. 15, Iss. 1, 2022, pp. 137-151. [25] Courtois, N.T., Hulme, D., and Mourouzis, T., Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis, in Proc. the fifth workshop on SpecialPurpose Hardware for Attacking Cryptographic Systems, Washington, DC, USA, 2012, pp. 179-191. [26] Tay, J.J., Wong, M.L.D., Wong, M.M., Zhang, C. and Hijazin, I., Compact FPGA implementation of PRESENT with Boolean S-Box, in Proc. 6 th Asia Symp. Quality Electron. Design, Aug. 2015, pp. 144-148. [27] Kocher, P., Jaffe, J., and Jun, B., Differential power analysis, in Proc. of Advances in Cryptology, 1999, Berlin, Germany, pp. 388-397. [28] Kocher, P.C., Timing Attacks on Implementations of Diffie“Hellman, RSA, DSS, in Proc. of Advances in Cryptology, 1996, Berlin, Germany, pp. 104-113. [29] Hayashi, Y.I., and Homma, N., Mizuki, T., Aoki, T., Sone, H., Sauvage, L., and Danger, J.L., Analysis of electromagnetic information leakage from cryptographic devices with different physical structures, IEEE Transactions on Electromagnetic Compatibility, Vol. 55,No. 3, 2013, pp. 571-580. | ||
آمار تعداد مشاهده مقاله: 230 تعداد دریافت فایل اصل مقاله: 190 |