Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks

被引:1
|
作者
Lewandowski, Matthew [1 ]
Katkoori, Srinivas [1 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
关键词
cryptanalysis; cryptographic hardware; differential plaintext attack; hardware security; present-80; substitution-permutation;
D O I
10.1109/ISVLSI51109.2021.00070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a countermeasure for thwarting side-channel assisted differential plaintext attacks on hardware based cryptographic algorithms employing a substitution-permutation network structure. The countermeasure we present, dynamic keyed permutation networks, is integrated directly into a PRESENT-80 OpenCore and using the Cadence GSCLIB 45 nanometer standard cell library we perform attacks on both a modified and unmodified PRESENT-80. Ultimately, we will show that not only does this method successfully thwart differential plaintext attacks but it is also lightweight and increases resilience of the algorithm. Additionally, we demonstrate how PRESENT-80 can be attacked without the need of side-channel techniques and how the presented countermeasure further increases resilience and prevents such an attack.
引用
收藏
页码:350 / 355
页数:6
相关论文
共 35 条
  • [1] Proving the security of AES substitution-permutation network
    Baignères, T
    Vaudenay, S
    SELECTED AREAS IN CRYPTOGRAPHY, 2006, 3897 : 65 - 81
  • [2] Towards provable security of substitution-permutation encryption networks
    Chen, ZG
    Tavares, SE
    SELECTED AREAS IN CRYPTOGRAPHY, 1999, 1556 : 43 - 56
  • [3] Provable Security of (Tweakable) Block Ciphers Based on Substitution-Permutation Networks
    Cogliati, Benoit
    Dodis, Yevgeniy
    Katz, Jonathan
    Lee, Jooyoung
    Steinberger, John
    Thiruvengadam, Aishwarya
    Zhang, Zhe
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT I, 2018, 10991 : 722 - 753
  • [4] PROBABILISTIC COMPLETENESS OF SUBSTITUTION-PERMUTATION ENCRYPTION NETWORKS
    AYOUB, F
    IEE PROCEEDINGS-E COMPUTERS AND DIGITAL TECHNIQUES, 1982, 129 (05): : 195 - 199
  • [5] Provable security of substitution-permutation encryption networks against linear cryptanalysis
    Keliher, L
    Meijer, H
    Tavares, S
    2000 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, CONFERENCE PROCEEDINGS, VOLS 1 AND 2: NAVIGATING TO A NEW ERA, 2000, : 37 - 42
  • [6] Modeling linear characteristics of substitution-permutation networks
    Keliher, L
    Meijer, H
    Tavares, S
    SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 78 - 91
  • [7] AVALANCHE CHARACTERISTICS OF SUBSTITUTION-PERMUTATION ENCRYPTION NETWORKS
    HEYS, HM
    TAVARES, SE
    IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (09) : 1131 - 1139
  • [8] STRUCTURED DESIGN OF SUBSTITUTION-PERMUTATION ENCRYPTION NETWORKS
    KAM, JB
    DAVIDA, GI
    IEEE TRANSACTIONS ON COMPUTERS, 1979, 28 (10) : 747 - 753
  • [9] SoK : On DFA Vulnerabilities of Substitution-Permutation Networks
    Khairallah, Mustafa
    Hou, Xiaolu
    Najm, Zakaria
    Breier, Jakub
    Bhasin, Shivam
    Peyrin, Thomas
    PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19), 2019, : 403 - 414
  • [10] On Compact Cauchy Matrices for Substitution-Permutation Networks
    Cui, Ting
    Jin, Chenhui
    Kong, Zhiyin
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (07) : 2098 - 2102