Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks

被引:1
|
作者
Lewandowski, Matthew [1 ]
Katkoori, Srinivas [1 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
关键词
cryptanalysis; cryptographic hardware; differential plaintext attack; hardware security; present-80; substitution-permutation;
D O I
10.1109/ISVLSI51109.2021.00070
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This work presents a countermeasure for thwarting side-channel assisted differential plaintext attacks on hardware based cryptographic algorithms employing a substitution-permutation network structure. The countermeasure we present, dynamic keyed permutation networks, is integrated directly into a PRESENT-80 OpenCore and using the Cadence GSCLIB 45 nanometer standard cell library we perform attacks on both a modified and unmodified PRESENT-80. Ultimately, we will show that not only does this method successfully thwart differential plaintext attacks but it is also lightweight and increases resilience of the algorithm. Additionally, we demonstrate how PRESENT-80 can be attacked without the need of side-channel techniques and how the presented countermeasure further increases resilience and prevents such an attack.
引用
收藏
页码:350 / 355
页数:6
相关论文
共 35 条
  • [31] FINDING HIGHLY PROBABLE DIFFERENTIAL CHARACTERISTICS OF SUBSTITUTION-PERMUTATION NETWORKS USING GENETIC ALGORITHMS
    Abadi, Mahdi
    Sadeghiyan, Babak
    Ghaemi, Abbas
    Alipour, Mohammad A.
    IRANIAN JOURNAL OF MATHEMATICAL SCIENCES AND INFORMATICS, 2007, 2 (02): : 45 - 56
  • [32] SPN-DPUF: Substitution-Permutation Network based Secure Circuit for Digital PUF
    Marconot, Johan
    Hely, David
    Pebay-Peyroula, Florian
    2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 49 - 54
  • [33] Key Based S-Box Selection and Key Expansion Algorithm for Substitution-Permutation Network Cryptography
    Nayaka, Raja Jitendra
    Biradar, R. C.
    2013 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS & 2013 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMMUNICATIONS & RENEWABLE ENERGY (AICERA/ICMICR), 2013,
  • [34] Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers
    Liu, Zhiqiang
    Liu, Ya
    Wang, Qingju
    Gu, Dawu
    Li, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 672 - 681
  • [35] Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes
    Dong, Le
    Wang, Yanling
    Wu, Wenling
    Zou, Jian
    IET INFORMATION SECURITY, 2015, 9 (05) : 277 - 283