Further Results on Efficient Implementations of Block Cipher Linear Layers

被引:8
|
作者
Banik, Subhadeep [1 ]
Funabiki, Yuki [2 ]
Isobe, Takanori [3 ]
机构
[1] Ecole Polytech Fed Lausanne, LASEC, Lausanne, Switzerland
[2] Sony Corp, Tokyo 1080075, Japan
[3] Univ Hyogo, Grad Sch Appl Informat, Kobe, Hyogo 6500047, Japan
基金
日本学术振兴会; 瑞士国家科学基金会;
关键词
lightweight; MDS matrices; straight line programs; MDS MATRICES; FAMILY;
D O I
10.1587/transfun.2020CIP0013
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At the FSE conference of ToSC 2018, Kranz et al. presented their results on shortest linear programs for the linear layers of several well known block ciphers in literature. Shortest linear programs are essentially the minimum number of 2-input xor gates required to completely describe a linear system of equations. In the above paper the authors showed that the commonly used metrics like d-xor/s-xor count that are used to judge the "lightweightedness" do not represent the minimum number of xor gates required to describe a given MDS matrix. In fact they used heuristic based algorithms of Boyar-Peralta and Paar to find implementations of MDS matrices with even fewer xor gates than was previously known. They proved that the AES mixcolumn matrix can be implemented with as little as 97 xor gates. In this paper we show that the values reported in the above paper are not optimal. By suitably including random bits in the instances of the above algorithms we can achieve implementations of almost all matrices with lesser number of gates than were reported in the above paper. As a result we report an implementation of the AES mixcolumn matrix that uses only 95 xor gates. In FSE conference of ToSC 2019, Li et al. had tweaked the Boyar-Peralta algorithm to get low depth implementations of many matrices. We show that by introducing randomness in the tweaked algorithm, it is again possible to get low depth implementations with lesser number of gates than the above paper. As a result, we report a depth implementation of the AES mixcolumn matrix that uses only 103 xor gates, which is 2 gates less than the previous implementation. In the second part of the paper, we observe that most standard cell libraries contain both 2 and 3-input xor gates, with the silicon area of the 3-input xor gate being smaller than the sum of the areas of two 2-input xor gates. Hence when linear circuits are synthesized by logic compilers (with specific instructions to optimize for area), most of them would return a solution circuit containing both 2 and 3-input xor gates. Thus from a practical point of view, reducing circuit size in presence of these gates is no longer equivalent to solving the shortest linear program. In this paper we show that by adopting a graph based heuristic it is possible to convert a circuit constructed with 2-input xor gates to another functionally equivalent circuit that utilizes both 2 and 3-input xor gates and occupies less hardware area. As a result we obtain more lightweight implementations of all the matrices listed in the ToSC paper.
引用
收藏
页码:213 / 225
页数:13
相关论文
共 50 条
  • [1] Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU
    Choi, Hojin
    Seo, Seog Chung
    IEEE ACCESS, 2022, 10 : 85995 - 86007
  • [2] Secure and efficient design of software block cipher implementations on microcontrollers
    Pelosi, G. (pelosi@elet.polimi.it), 1600, Inderscience Enterprises Ltd., 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (04): : 2 - 3
  • [3] Secure and efficient design of software block cipher implementations on microcontrollers
    Barenghi, Alessandro
    Pelosi, Gerardo
    Terraneo, Federico
    INTERNATIONAL JOURNAL OF GRID AND UTILITY COMPUTING, 2013, 4 (2-3) : 110 - 118
  • [4] Efficient Parallel Implementations of PIPO Block Cipher on CPU and GPU
    Choi, Hojin
    Seo, Seog Chung
    IEEE Access, 2022, 10 : 85995 - 86007
  • [5] FPGA implementations of the ICEBERG block cipher
    Standaert, FX
    Piret, G
    Rouvroy, G
    Quisquater, JJ
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 556 - 561
  • [6] FPGA implementations of the ICEBERG block cipher
    Standaert, F. -X.
    Piret, G.
    Rouvroy, G.
    Quisquater, J. -J.
    INTEGRATION-THE VLSI JOURNAL, 2007, 40 (01) : 20 - 27
  • [7] Algebraic techniques on searching linear diffusion layers in block cipher
    Zhang, Wenying
    Zhang, Wenyu
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4285 - 4294
  • [8] Automatic Formal Verification of Block Cipher Implementations
    Smith, Eric Whitman
    Dill, David L.
    2008 FORMAL METHODS IN COMPUTER-AIDED DESIGN, 2008, : 45 - 51
  • [9] PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
    Kim, Hangi
    Jeon, Yongjin
    Kim, Giyoon
    Kim, Jongsung
    Sim, Bo-Yeon
    Han, Dong-Guk
    Seo, Hwajeong
    Kim, Seonggyeom
    Hong, Seokhie
    Sung, Jaechul
    Hong, Deukjo
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2020, 2021, 12593 : 99 - 122
  • [10] Hardware architectures for PRESENT block cipher and their FPGA implementations
    Pandey, Jai Gopal
    Goel, Tarun
    Karmakar, Abhijit
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (07) : 958 - 969