Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size

被引:0
|
作者
Hiraga, Yukihito [1 ]
Naito, Yusuke [2 ]
Sasaki, Yu [3 ]
Sugawara, Takeshi [1 ]
机构
[1] Univ Electrocommun, Tokyo, Japan
[2] Mitsubishi Electr Corp, Yokohama, Kanagawa, Japan
[3] NTT Social Informat Labs, Tokyo, Japan
来源
关键词
Deterministic Authenticated Encryption; Permutation; Low Memory; Mode; SIV; Security Proof; Hardware; PHOTON256; LIGHTWEIGHT; SECURITY;
D O I
10.1007/978-3-031-49187-0_18
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Deterministic authenticated encryption (DAE) provides data integrity and authenticity with certain robustness. Previous DAE schemes for low memory are based on block ciphers (BCs) or tweakable block ciphers (TBCs), which can be implemented with 3s bits of memory for s-bit security. On the other hand, schemes based on cryptographic permutations have attracted many researchers and standardization bodies. However, existing permutation-based DAEs require at least 4s bits, or even 5s bits of memory. In this paper, PALM, a new permutationbased DAE mode that can be implemented only with 3s bits of memory is proposed, implying that permutation-based DAEs achieve a competitive memory size with BC- and TBC-based DAEs. Our hardware implementation of PALM, instantiated with PHOTON256 for 128-bit security, achieves 3,585 GE, comparable with the state-of-the-art TBC-based DAE. Finally, optimality of 3s bits of memory of PALM is shown.
引用
收藏
页码:351 / 371
页数:21
相关论文
共 50 条
  • [21] Boolean permutation-based key escrow
    Wu, CK
    Varadharajan, V
    COMPUTERS & ELECTRICAL ENGINEERING, 1999, 25 (04) : 291 - 304
  • [22] Permutation-based tests of perfect ranking
    Zamanzade, Ehsan
    Arghami, Nasser Reza
    Vock, Michael
    STATISTICS & PROBABILITY LETTERS, 2012, 82 (12) : 2213 - 2220
  • [23] Permutation-based Sequential Pattern Hiding
    Gwadera, Robert
    Gkoulalas-Divanis, Aris
    Loukides, Grigorios
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2013, : 241 - 250
  • [24] Quantized Ranking for Permutation-Based Indexing
    Mohamed, Hisham
    Marchand-Maillet, Stephane
    SIMILARITY SEARCH AND APPLICATIONS (SISAP), 2013, 8199 : 103 - 114
  • [25] A PERMUTATION-BASED ALGORITHM FOR BLOCK CLUSTERING
    DUFFY, DE
    QUIROZ, AJ
    JOURNAL OF CLASSIFICATION, 1991, 8 (01) : 65 - 91
  • [26] A Permutation-based Code for the Wiretap Channel
    Kang, Wei
    Liu, Nan
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2306 - 2310
  • [27] Identity-based authenticated broadcast encryption and distributed authenticated encryption
    Mu, Y
    Susilo, W
    Lin, YX
    Ruan, C
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2004, PROCEEDINGS, 2004, 3321 : 169 - 181
  • [28] LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security
    Naito, Yusuke
    Sasaki, Yu
    Sugawara, Takeshi
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (04) : 1 - 38
  • [29] MMM: Authenticated Encryption with Minimum Secret State for Masking
    Naito Y.
    Sasaki Y.
    Sugawara T.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (04): : 80 - 109
  • [30] SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things
    Banik, Subhadeep
    Bogdanov, Audrey
    Luykx, Atul
    Tischhauser, Elmar
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (03) : 1 - 35