Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks

被引:1
|
作者
Lewandowski, Matthew [1 ]
Katkoori, Srinivas [1 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
关键词
cryptanalysis; cryptographic hardware; differential plaintext attack; hardware security; present-80; substitution-permutation;
D O I
10.1109/ISVLSI51109.2021.00070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a countermeasure for thwarting side-channel assisted differential plaintext attacks on hardware based cryptographic algorithms employing a substitution-permutation network structure. The countermeasure we present, dynamic keyed permutation networks, is integrated directly into a PRESENT-80 OpenCore and using the Cadence GSCLIB 45 nanometer standard cell library we perform attacks on both a modified and unmodified PRESENT-80. Ultimately, we will show that not only does this method successfully thwart differential plaintext attacks but it is also lightweight and increases resilience of the algorithm. Additionally, we demonstrate how PRESENT-80 can be attacked without the need of side-channel techniques and how the presented countermeasure further increases resilience and prevents such an attack.
引用
收藏
页码:350 / 355
页数:6
相关论文
共 35 条
  • [21] Differential-like cryptanalysis of a class of substitution-permutation networks
    Chen, ZG
    Youssef, AM
    Tavares, SE
    UNIVERSITY AND INDUSTRY - PARTNERS IN SUCCESS, CONFERENCE PROCEEDINGS VOLS 1-2, 1998, : 433 - 436
  • [22] A DIFFERENTIAL CRYPTANALYSIS OF TREE-STRUCTURED SUBSTITUTION-PERMUTATION NETWORKS
    OCONNOR, L
    IEEE TRANSACTIONS ON COMPUTERS, 1995, 44 (09) : 1150 - 1152
  • [23] Inefficiency of variant characteristics for substitution-permutation networks with position permutations
    Sadowski, A
    INFORMATION SECURITY AND PRIVACY, 1997, 1270 : 171 - 182
  • [24] A Color Image Encryption Technique Based on a Substitution-Permutation Network
    Mastan, J. Mohamedmoideen Kader
    Sathishkumar, G. A.
    Bagan, K. Bhoopathy
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 524 - +
  • [25] Beyond-Birthday-Bound Security for 4-round Linear Substitution-Permutation Networks
    Gao, Yuan
    Guo, Chun
    Wang, Meiqin
    Wang, Weijia
    Wen, Jiejing
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 305 - 326
  • [26] A novel image encryption scheme based on substitution-permutation network and chaos
    Belazi, Akram
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    SIGNAL PROCESSING, 2016, 128 : 155 - 170
  • [27] Automatic Search for a Maximum Probability Differential Characteristic in a Substitution-Permutation Network
    Arnaud, Bannier
    Nicolas, Bodin
    Eric, Filiol
    2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, : 5165 - 5174
  • [28] Development and Analysis of Symmetric Encryption Algorithm Qamal Based on a Substitution-permutation Network
    Biyashev, Rustem G.
    Kapalova, Nursulu A.
    Dyusenbayev, Dilmuhanbet S.
    Algazy, Kunbolat T.
    Wojcik, Waldemar
    Smolarz, Andrzej
    INTERNATIONAL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2021, 67 (01) : 127 - 132
  • [29] Cryptanalysis of substitution-permutation network based image encryption schemes: a systematic review
    Dhall, Sakshi
    Yadav, Khushboo
    NONLINEAR DYNAMICS, 2024, 112 (17) : 14719 - 14744
  • [30] Parity-based concurrent error detection of substitution-permutation network block ciphers
    Karri, R
    Kuznetsov, G
    Goessel, M
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 113 - +