Security Evaluation of Light-weight Block Ciphers by Gpgpu
نویسندگان
چکیده
Nowadays, general purpose graphical processing unit (GPGPU) has been used in many ares. We use it for security evaluation of light-weight block ciphers. Light-weight block cipher is one of key technologies for small communication devices such as sensor network. To design a light-weight block cipher whose fastness and security are balanced, so that, its security margin should be evaluated exactly. One of security evaluation method, we focus on integral attack which exploits integral distinguisher to recover some round keys. Integral distinguisher is the main factor of integral attack, and it can be obtained by computer experiment. We use GPGPU to accelerate computer experiment. We propose an algorithm to search for upper bound of integral distinguisher by GPGPU. There are theoretical and experimental steps. We specify lower order integral distinguisher from upper bound one in the theoretical step. Such integral distinguisher is tested by computer experiment in the experimental step. By applying the proposal algorithm to HIGHT, TWINE, LBlock, PRESENT and RECTANGLE, we obtain more advantageous results.
منابع مشابه
Cryptography for Resource Constrained Devices: A Survey
Specifically designed and developed cryptographic algorithms, which are suitable for implementation in resource constrained devices such as RFID systems, smart cards and wireless sensor networks are called light weight cryptographic algorithms. In this paper a survey is done on the selected light weight cryptographic algorithms. The light weight cryptographic algorithms are of two types, block ...
متن کاملDifferential Security Evaluation of Simeck with Dynamic Key-guessing Techniques
The Simeck family of lightweight block ciphers was proposed in CHES 2015 which combines the good design components from NSA designed ciphers SIMON and SPECK. Dynamic key-guessing techniques were proposed by Wang et al. to greatly reduce the key space guessed in differential cryptanalysis and work well on SIMON. In this paper, we implement the dynamic key-guessing techniques in a program to auto...
متن کاملSurvey on Lightweight Block Cipher
183 Abstract— With the rapid advances in wireless networks low-end devices, such as RFID tags, wireless sensor nodes are deployed in increasing numbers each and every day. Such devices are used in many applications and environments, leading to an ever increasing need to provide security. When choosing security algorithms for resource-limited devices the implementation cost should be taken int...
متن کاملOptimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
The security requirements in Wireless Sensor Networks (WSNs) and the mechanisms to support the requirements, demand a critical examination. Therefore, the security protocols employed in WSNs should be so designed, as to yield the optimum performance. The efficiency of the block cipher is, one of the important factors in leveraging the performance of any security protocol. In this paper, therefo...
متن کاملA new CPA resistant software implementation for symmetric ciphers with smoothed power consumption: SIMON case study
In this paper we propose a new method for applying hiding countermeasure against CPA attacks. This method is for software implementation, based on smoothing power consumption of the device. This method is evaluated on the SIMON scheme as a case study; however, it is not relying on any specific SIMON features. Our new method includes only AND equivalent and XOR equivalent operations since every ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016