On the design of bit permutation based ciphers: The interplay among s-box, bit permutation and key-addition

0Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Bit permutation based block ciphers, like PRESENT and GIFT, are well-known for their extreme lightweightness in hardware implementation. However, designing such ciphers comes with one major challenge – to ensure strong cryptographic properties simply depending on the combination of three components, namely S-box, a bit permutation and a key addition function. Having a wrong combination of components could lead to weaknesses. In this article, we studied the interaction between these components, improved the theoretical security bound of GIFT and highlighted the potential pitfalls associated with a bit permutation based primitive design. We also conducted analysis on TRIFLE, a first-round candidate for the NIST lightweight cryptography competition, where our findings influenced the elimination of TRIFLE from second-round of the NIST competition. In particular, we showed that internal state bits of TRIFLE can be partially decrypted for a few rounds even without any knowledge of the key.

Cite

CITATION STYLE

APA

Sarkar, S., Sasaki, Y., & Sim, S. M. (2020). On the design of bit permutation based ciphers: The interplay among s-box, bit permutation and key-addition. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12231 LNCS, pp. 3–22). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-58208-1_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free