Paper title:

Secure and Efficient Diffusion Layers for Block Ciphers

DOI: https://doi.org/10.4316/JACSM.201702002
Published in: Issue 2, (Vol. 11) / 2017
Publishing date: 2017-10-13
Pages: 15-20
Author(s): KUMAR Manoj, YADAV Pratibha, PAL Saibal K, PANIGRAHI Anupama
Abstract. Modern block ciphers are designed to meet confusion and diffusion criteria. Substitution and permutation layers are used in the round function for this purpose. In this paper, we present a number of choices for diffusion layer by using circular shift and XOR operations. These two operations are most efficient for software implementations. We test all possible combinations of circular shift and XOR operations for 16-bit and 32-bit words. We search for optimal number of circular shifts to provide the maximum value of branch number. We also search for secure diffusion layers with efficient inversion for SPN based block ciphers. We categorize the diffusion layers according to the value of their branch number. Finally, we suggest a list of secure and efficient diffusion layers for new block cipher proposals. We also compare the security of a model block cipher using one of these diffusion layers with other lightweight block ciphers
Keywords: Block Cipher, Branch Number, Diffusion Layer, Permutation
References:

1. E. Biham, A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems. Journal of Cryptology, Vol. 4, No. 1, pp. 372 (1991)

2. A. Bogdanov, Analysis and Design of Block Cipher Constructions. PhD thesis (2009)

3. A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: An Ultra-Lightweight Block Cipher. CHES 2007, LNCS, Vol. 4727, pp. 450-466, Springer (2007)

4. G. Bansod, N. Pisharoty, A. Patil, PICO: An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing her. Defence Science Journal, Vol. 66, No. 3, May 2016, pp. 259-265, (2016)

5. J. Daemen, V. Rijmen, The Design of Rijndael. Springer-Verlag (2002)

6. W. Diffie, G. Ledin, (translators): SMS4 Encryption Algorithm for Wireless Networks. Cryptology ePrint Archive, Report 2008/329, (2008)

7. M. Kanda, Practical Security Evaluation against Differential and Linear Cryptanalysis for Feistel Ciphers with SPN Round Function. SAC 2000, LNCS 2012, pp. 324-338, Springer-Verlag (2001)

8. L. Knudsen, M.J.B. Robshaw, Block cipher companion. Book Springer, ISBN 978-3-642-17341-7 (2011)

9. M. Kumar, S.K. Pal, A. Panigrahi, FeW: A lightweight Block Ciphers. Cryptology ePrint Archive, Report 2014/326, (2014)

10. NIST, Data Encryption Standard. Federal Information Processing Standard (FIPS), Publication 46, U.S. Department of Commerce, Washington D.C., January (1977)

11. V. Rijmen, Cryptanalysis and Design of iterated Block Cipher. PhD Thesis (1997)

12. M.O. Saarinen, Cryptographic Analysis of all 4x4 bit S-boxes. Cryptology ePrint Archive, Report 2011/218, (2011)

13. M. Sajadieh, M. Dakhilalian, H. Mala, P. Sepehrdad, Efficient Recursive Diffusion Layers for block Ciphers and Hash Functions. Journal of Cryptology, Vol. 28, pp. 240-256 (2015)

14. C.E. Shannon, Communication Theory of Secrecy Systems. Bell Systems Technical Journal, pp. 656-715 (1949)

15. T. Suzaki, K. Minematsu, S. Morioka, E. Kobayashi, Twine: A Lightweight, Versatile Block cipher. ECRYPT Workshop on Lightweight Cryptography (2011)

16. M. Wang, Differential Cryptanalysis of Reduced-Round PRESENT, Africacrypt, LNCS, vol. 5023, springer (2008)

17. W. Wu, L. Zhang, LBlock: Lightweight Block Cipher. Cryptology ePrint Archive, 2011/345 (2011)

18. W. Zhang, Z. Bao, D. Lin, V. Rijmen, B. Yang, I. Verbauwhede, RECTANGLE: A Bit-slice Ultra-Lightweight Cipher Suitable for Multiple Platforms. Cryptology ePrint Archive, Report 2014/084 (2014)

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2024