Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size

被引:0
|
作者
Hiraga, Yukihito [1 ]
Naito, Yusuke [2 ]
Sasaki, Yu [3 ]
Sugawara, Takeshi [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
[2] Mitsubishi Electr Corp, Yokohama, Kanagawa, Japan
[3] NTT Social Informat Labs, Tokyo, Japan
来源
关键词
Deterministic Authenticated Encryption; Permutation; Low Memory; Mode; SIV; Security Proof; Hardware; PHOTON256; LIGHTWEIGHT; SECURITY;
D O I
10.1007/978-3-031-49187-0_18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deterministic authenticated encryption (DAE) provides data integrity and authenticity with certain robustness. Previous DAE schemes for low memory are based on block ciphers (BCs) or tweakable block ciphers (TBCs), which can be implemented with 3s bits of memory for s-bit security. On the other hand, schemes based on cryptographic permutations have attracted many researchers and standardization bodies. However, existing permutation-based DAEs require at least 4s bits, or even 5s bits of memory. In this paper, PALM, a new permutationbased DAE mode that can be implemented only with 3s bits of memory is proposed, implying that permutation-based DAEs achieve a competitive memory size with BC- and TBC-based DAEs. Our hardware implementation of PALM, instantiated with PHOTON256 for 128-bit security, achieves 3,585 GE, comparable with the state-of-the-art TBC-based DAE. Finally, optimality of 3s bits of memory of PALM is shown.
引用
收藏
页码:351 / 371
页数:21
相关论文
共 50 条
  • [1] PAEQ: Parallelizable permutation-based authenticated encryption
    Biryukov, Alex (alex.biryukov@uni.lu), 1600, Springer Verlag (8783):
  • [2] APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography
    Andreeva, Elena
    Bilgin, Begul
    Bogdanov, Andrey
    Luykx, Atul
    Mennink, Bart
    Mouha, Nicky
    Yasuda, Kan
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 168 - 186
  • [3] Deterministic Authenticated Encryption Scheme for Memory Constrained Devices
    Agrawal, Megha
    Chang, Donghoon
    Kang, Jinkeon
    CRYPTOGRAPHY, 2018, 2 (04) : 1 - 22
  • [4] Permutation-Based Lightweight Authenticated Cipher with beyond Conventional Security
    Zhang, Ping
    Security and Communication Networks, 2021, 2021
  • [5] Permutation-Based Lightweight Authenticated Cipher with Beyond Conventional Security
    Zhang, Ping
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] A novel bit permutation-based image encryption algorithm
    Saiyma Fatima Raza
    Vishal Satpute
    Nonlinear Dynamics, 2019, 95 : 859 - 873
  • [7] ArMTFr: a new permutation-based image encryption scheme
    Elkamchouchi, Hassan
    Salama, Wessam M.
    Abouelseoud, Yasmine
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2019, 11 (01) : 1 - 28
  • [8] Motion Compensation Techniques in Permutation-Based Video Encryption
    Sabino, Caio C.
    Andrade, Lais S.
    Ren, Tsang Ing
    Cavalcanti, George D. C.
    Jyh, Tsang Ing
    Sijbers, Jan
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 1578 - 1581
  • [9] A novel bit permutation-based image encryption algorithm
    Raza, Saiyma Fatima
    Satpute, Vishal
    NONLINEAR DYNAMICS, 2019, 95 (02) : 859 - 873
  • [10] New approach for attack of permutation-based image encryption schemes
    Mekhaznia T.
    Bennour A.
    International Journal of Computers and Applications, 2021, 43 (07) : 697 - 705