2006
DOI: 10.1007/s11235-006-9135-5
|View full text |Cite
|
Sign up to set email alerts
|

Controlled elements for designing ciphers suitable to efficient VLSI implementation

Abstract: This work considers the problem of increasing the performance of the ciphers based on Data-Dependent (DD) operations (DDO) for VLSI implementations. New minimum size primitives are proposed to design DDOs. Using advanced DDOs instead of DD permutations (DDP) in the DDP-based iterative ciphers Cobra-H64 and Cobra-H128 the number of rounds has been significantly reduced yielding enhancement of the "performance per cost" value and retaining security at the level of indistinguishability from a random transformatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…Description of DDO-64V 1 and DDO-64V 2 DDO-64V 1 and DDO-64V 2 (Moldovyan et al, 2004(Moldovyan et al, , 2006 are 8-round block ciphers with a 64-bit block and a 128-bit key. The only difference between DDO-64V 1 and DDO-64V 2 is the used key scheduling algorithm.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Description of DDO-64V 1 and DDO-64V 2 DDO-64V 1 and DDO-64V 2 (Moldovyan et al, 2004(Moldovyan et al, , 2006 are 8-round block ciphers with a 64-bit block and a 128-bit key. The only difference between DDO-64V 1 and DDO-64V 2 is the used key scheduling algorithm.…”
Section: Preliminariesmentioning
confidence: 99%
“…To overcome these weaknesses of DDPs and update some DDP-based ciphers, variable data-dependent operations (DDOs) (Moldovyan et al, 2004;Moldovyan et al, 2006) that change arbitrarily the weights of transformed binary vectors were developed, and DDO-64 (Moldovyan et al, 2004;Moldovyan et al, 2006) was proposed as an example of the DDObased cipher; there are two versions of DDO-64 according to the key schedule, which are called DDO-64V 1 (Moldovyan et al, 2006) and DDO-64V 2 (Moldovyan et al, 2004). They are both 64-bit block ciphers with a 128-bit key and 8 rounds, which achieve more efficient hardware implementations than the existing DDPbased ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…Currently on a mass scale there are available FPGA devices of new generation, which allow essentially improve the performance of information transformation. Earlier in works [1][2][3][4][5][6][7][8][9][10][11][12][13] there was developed an approach to the synthesis of fast cipher oriented to efficient hardware implementation, which is based on applying the data-driven operations that are performed with the controlled substitution-permutation networks (CSPNs). The CSPN-based operating blocks are implemented in the form of a multilayer structure, the active layers of which represent cascades of the controlled elements (CEs) with a two-bit input for data.…”
Section: Introductionmentioning
confidence: 99%
“…Although lots of researchers have focused on how to enhance the security of construction designs using different operations and functions, for instance, DDP (Data-Dependent Permutation) -based ciphers (such as DDP-64 [3], Cobra-family [3] and SCO (Switchable Controlled Operation) -family [2]), DDO (Data-Dependent Operation) -based ciphers (such as MD-64 [4], KT-64 [5], CTPO (Controlled Two-Place Operation) [6] and DDO-64 [7]), and SDDO-based ciphers (such as XO-64 [8] or BMD-128 [9]), their weaknesses have been recently explored with common related attacks. A simple key schedule generator for high speed transformation and lightweight targets can lead to an attack possibility for cryptanalysis using common related-key attack methods.…”
Section: Introductionmentioning
confidence: 99%