2018
DOI: 10.13164/re.2018.0541
|View full text |Cite
|
Sign up to set email alerts
|

Area-Efficient Hardware Architectures of MISTY1 Block Cipher

Abstract: In this paper, state-of-the-art hardware implementations of MISTY1 block cipher are presented for areaconstrained wireless applications. The proposed MISTY1 architectures are characterized of highly optimized transformation functions i.e. FL and {FO-XOR-EKG}. The FL function re-utilizes logic AND-OR-XOR combinations whereas {FO-XOR-EKG} function explores 2 × compact design schemes for s-boxes implementation. A Combined Substitution Unit (CSU) and threshold area implementation are proposed for s-boxes based on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 22 publications
0
3
0
Order By: Relevance
“…Thus, the entire bit-stream and logic functionality / selection methodology has to be uploaded on the initial-run of FPGA and is, therefore, more prone to attacks. Moreover, the repetitive-loop structure results in a low throughput value of 130.2 Mbps and in-turn the high-power consumption [ 15 26 ]. Studies on static reconfigurable cryptographic modules have also been proposed for SNOW / ZUC algorithms and AES / KASUMI / SNOW / ZUC algorithms signifying flexible implementations [ 14 , 27 – 36 ].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, the entire bit-stream and logic functionality / selection methodology has to be uploaded on the initial-run of FPGA and is, therefore, more prone to attacks. Moreover, the repetitive-loop structure results in a low throughput value of 130.2 Mbps and in-turn the high-power consumption [ 15 26 ]. Studies on static reconfigurable cryptographic modules have also been proposed for SNOW / ZUC algorithms and AES / KASUMI / SNOW / ZUC algorithms signifying flexible implementations [ 14 , 27 – 36 ].…”
Section: Introductionmentioning
confidence: 99%
“…To meet the requirement of the Internet of ings, cryptographic algorithms are frequently optimized for area reduction and high throughput implementation or to achieve a good tradeoff between throughput and speed [12][13][14][15][16][17][18][19][20][21][22][23][24][25]. For low-area design, reutilization/logic optimization methodologies have been widely adopted thereby implementing s-boxes using combinational logic [12][13][14][15][16][17][18][19][20]. A single-round MISTY1 architecture designed for compact implementation is proposed in [20] consisting of only oddround functions, i.e., 2 × FL functions, 1 × FO function, and 1 × 32 bit XOR.…”
Section: Introductionmentioning
confidence: 99%
“…Finally, 2 × area-efficient MISTY1 design schemes are proposed in [17] based on the combined substitution unit and threshold throughput requirements.…”
Section: Introductionmentioning
confidence: 99%