Heavy Quark for secure AEAD
نویسندگان
چکیده
Lightweight primitives are generally limited to 80or 128-bit security, because lightweight applications seldom need more than this. However, non-lightweight platforms like multimedia systems-on-chip would also greatly benefit from a smaller hardware footprint, as it reduces development and integration costs, and leaves more circuit area to another component, or to add another functionality. Such systems sometimes need up to 256-bit security, for example to ensure a consistent security level across primitives. This paper thus breaks with the tradition and proposes a 256-bit authenticated encryption scheme with associated data (AEAD), based on the lightweight design Quark. We create a new Quark instance to use in a custom SpongeWrap mode, offering one-pass AEAD supporting arbitrary interleaving of encrypted and associated data, as well as a range of trade-offs between security and usage limit. More than a new primitive, this work provides insights on the scalability of lightweight designs to higher security levels: our new design c-Quark has internal state of 384 bits, and allows the implementation of 256-bit AEAD with in the order of 4000 GE.
منابع مشابه
THE ROLE OF QUARK POLARIZATION IN HEAVY QUARK FRAGMENTATION
We calculate the exact fragmentation functions for c and b quark fragmentation taking into account the spin orientation of the initial heavy quark in the form of analytical and rather simple expressions. Our calculations show that spin orientation may have an important effect on the fragmentation spectrum. This effect is more striking in the cases of c ?D, D*; c? ? , ? , and ?B , B *.
متن کاملModeling Magnetic Field in Heavy ion Collisions Using Two Different Nuclear Charge Density Distributions
By studying the properties of matter during heavy-ion collisions, a better understanding of the Quark-Gluon plasma is possible. One of the main areas of this study is the calculation of the magnetic field, particularly how the values of conductivity affects this field and how the field strength changes with proper time. In matching the theoretical calculations with results obtained in lab, two diffe...
متن کاملOn Authenticated Encryption Using Stream Ciphers Supporting an Initialisation Vector
We describe a systematic framework for using a stream cipher supporting an initialisation vector (IV) to perform various tasks of authentication and authenticated encryption. These include message authentication code (MAC), authenticated encryption (AE), authenticated encryption with associated data (AEAD) and deterministic authenticated encryption (DAE) with associated data. Several schemes ar...
متن کاملComparison between PKI (RSA-AES) and AEAD (AES-EAX PSK) Cryptography Systems for Use in SMS-Based Secure Transmissions
In today’s mobile communication systems, security offered by the network operator is often limited to the wireless link. This means that data delivered through mobile networks are not sufficiently protected. In the particular growing field of interest of machine-to-machine (M2M) communications, these applications typically require a mobile, secure and reliable means of data communication. This ...
متن کاملScaling behaviour of leptonic decay constants for heavy quarkonia and heavy mesons
In the framework of QCD sum rules one uses a scheme, allowing one to apply the conditions of both nonrelativistic heavy quark motion inside mesons and independence of nonsplitting nS-state density on the heavy quark flavours. In the leading order an analitic expression is derived for leptonic constants of both heavy quarkonia and heavy mesons with a single heavy quark. The expression allows one...
متن کامل