Compact Hardware Implementations of MISTY1 Block Cipher

被引:6
|
作者
Yasir [1 ]
Wu, Ning [1 ]
Zhang, Xiaoqiang [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, 29 Yudao St, Nanjing 210016, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
MISTY1; FO function; FI function; FL/FL-1; function; NESSIE; ISO; IEC; 3gpp; UMTS; ARCHITECTURE;
D O I
10.1142/S0218126618500378
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes compact hardware implementations of 64-bit NESSIE proposed MISTY1 block cipher for area constrained and low power ASIC applications. The architectures comprise only one round MISTY1 block cipher algorithm having optimized FO/FI function by re-utilizing S9/S7 substitution functions. A focus is also made on efficient logic implementations of S9 and S7 substitution functions using common sub-expression elimination (CSE) and parallel AND/XOR gates hierarchy. The proposed architecture 1 generates extended key with independent FI function and is suitable for MISTY1 8-rounds implementation. On the other hand, the proposed architecture 2 uses a single FO/FI function for both MISTY1 round function as well as extended key generation and can be employed for MISTY1 n > 8 rounds. To analyze the performance and covered area for ASICs, Synopsys Design Complier, SMIC 0.18 degrees mu m @ 1.8V is used. The hardware constituted 3041 and 2331 NAND gates achieving throughput of 171 and 166 Mbps for 8 rounds implementation of architectures 1 and 2, respectively. Comprehensive analysis of proposed designs is covered in this paper.
引用
收藏
页数:14
相关论文
共 50 条
  • [41] Hardware implementation of block cipher algorithm
    School of Computer, Wuhan University, Wuhan 430079, China
    不详
    Harbin Gongye Daxue Xuebao, 2006, 9 (1558-1562):
  • [42] Practical-time attacks against reduced variants of MISTY1
    Dunkelman, Orr
    Keller, Nathan
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 76 (03) : 601 - 627
  • [43] Practical-time attacks against reduced variants of MISTY1
    Computer Science Department, University of Haifa, Haifa
    31905, Israel
    不详
    52900, Israel
    Des Codes Cryptography, 3 (601-627):
  • [44] MISTY1算法变形体的滑动攻击
    戴艺滨
    陈少真
    信息工程大学学报, 2012, 13 (02) : 141 - 145+150
  • [45] Higher Order Differential Attacks on Reduced-Round MISTY1
    Tsunoo, Yukiyasu
    Saito, Teruo
    Shigeri, Maki
    Kawabata, Takeshi
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 415 - +
  • [46] Practical-time attacks against reduced variants of MISTY1
    Orr Dunkelman
    Nathan Keller
    Designs, Codes and Cryptography, 2015, 76 : 601 - 627
  • [47] Improving the efficiency of impossible differential cryptanalysis of reduced Camellia and MISTY1
    Lu, Jiqiang
    Kim, Jongsung
    Keller, Nathan
    Dunkelman, Orr
    TOPICS IN CRYPTOLOGY - CT-RSA 2008, PROCEEDINGS, 2008, 4964 : 370 - +
  • [48] Higher Order Differential Attack on 6-Round MISTY1
    Tsunoo, Yukiyasu
    Saito, Teruo
    Nakashima, Hiroki
    Shigeri, Maki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (01) : 3 - 10
  • [49] High-throughput block cipher implementations with SIMD
    Xu, Runqing
    Xiang, Zejun
    Lin, Da
    Zhang, Shasha
    He, Debiao
    Zeng, Xiangyong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [50] Implementations of Block Cipher SEED on Smartphone Operating Systems
    Lee, HwanJin
    Shin, DongHoon
    Jung, Hyun-Chul
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS AND TECHNOLOGIES (SECURWARE 2011), 2011, : 31 - 35