Filters








58 Hits in 2.6 sec

On Cipher Design Based on Switchable Controlled Operations [chapter]

Nikolay A. Moldovyan
2003 Lecture Notes in Computer Science  
This paper concerns the problem of reducing the implementation cost of the switchable data-dependent operations (SDDOs) that are a new cryptographic primitive oriented to the design of fast ciphers suitable  ...  The last design supplements the known particular constructions of SDDOs having symmetric topology. A new SDDO-based block cipher is presented and estimated.  ...  The SCO design considered above imposes no restrictions on the distribution of the controlling bits, however in the DDO-based ciphers usually the m-bit controlling vector V depends on some n-bit controlling  ... 
doi:10.1007/978-3-540-45215-7_27 fatcat:zutzts6rfreopcijtjtx6ecmoe

A Class of Data-Dependent Operations

Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev
2006 International Journal of Network Security  
New primitives are used to design switchable controlled operations and ciphers with simple key scheduling.  ...  This paper introduces a new class of the controlled primitives that are oriented to the use in the form of the data-dependent operations while designing fast hardwaresuitable ciphers.  ...  Section 4 discusses design of the switchable COS-box operations and presents several COS-based block ciphers.  ... 
dblp:journals/ijnsec/MoldovyanME06 fatcat:qqlikzqliffjfgivd6uaihumuq

High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers

N. Sklavos, N.A. Moldovyan, O. Koufopavlou
2005 Journal on spesial topics in mobile networks and applications  
The designed ciphers operate efficiently with different plaintext lengths, 64 and 128-bit, for Cobra-H64 and Cobra-H128, respectively.  ...  A novel feature of Cobra-H64 and Cobra-H128 is the use of the Switchable Operations which prevent the weak keys.  ...  The distribution of the bits of the controlling data subblock is a critical part in the design of the DDP-based ciphers.  ... 
doi:10.1023/b:mone.0000048556.51292.31 fatcat:otltzob5tjbi7lfltzyvsgnddi

Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets

Tran Phuc, Changhoon Lee
2018 Symmetry  
This cipher is based on switchable data-dependent operations (SDDO) and covers dependent-operations suitable for efficient primitive approaches for cipher constructions that can generate key schedule in  ...  It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs.  ...  This cipher is based on switchable data-dependent operations (SDDO) [2] , which is designed to combine data-dependent operations in functions and new feature of hybrid-controlled substitution-permutation  ... 
doi:10.3390/sym10080353 fatcat:pffghhd4cbf5ddelo5yaeacjnm

On Software Implementation of Fast DDP-based Ciphers

Nikolay A. Moldovyan, Peter A. Moldovyanu, Douglas H. Summerville
2007 International Journal of Network Security  
DDP can be performed with so called controlled permutation boxes (CPB) which are fast while implemented in cheap hardware.  ...  Different types of fast software and firmware encryption algorithms combining DDP with fast arithmetic operations are described.  ...  Security Estimation of the DDP-based Ciphers Security of the DDP-based ciphers described above is based on the properties of the P (L,e) 32;326 -box operations.  ... 
dblp:journals/ijnsec/MoldovyanMS07 fatcat:66h2y5kqnzfntdajynblvv4kk4

Hybrid Model in the Block Cipher Applications for High-speed Communications Networks

Minh Nguyen Hieu, Bac Do Thi, Canh Hoang Ngoc, Manh Cong Tran, Phan Duong Phuc, Khoa Nguyen Tuan
2020 International Journal of Computer Networks & Communications  
The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure.  ...  The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed.  ...  ACKNOWLEDGMENTS This research was supported by the project "Research, design and fabrication of IoT gateway devices integrated for the security solution in the IoT platform and applied for the air quality  ... 
doi:10.5121/ijcnc.2020.12404 fatcat:bt2bhbk6szbodkajfraycwapcq

An Effective and Secure Cipher Based on SDDO

Bac Do Thi, Minh Nguyen Hieu, Duy Ho Ngoc
2012 International Journal of Computer Network and Information Security  
Index Terms -Switchable data-dependent operations, hardware implementation, block cipher, controlled substitution permutation network, FPGA An Effective and Secure Cipher Based on SDDO  ...  This algorithm is built on the SDDO. Using this operator decreases significanthy the cost of hardware implementation.  ...  The switchable data-dependent controlled operations which on in BMD-128 are built via CSPNs with symmetry topology.  ... 
doi:10.5815/ijcnis.2012.11.01 fatcat:i6kutwrnobdfvhptcv66ix77au

A High Speed Block Cipher Algorithm

Bac Do Thi, Minh Nguyen Hieu
2013 International Journal of Security and Its Applications  
This paper is organized as follows: part 2 we present the structure of data-controlled element used in developing algorithm; part 3 presents the new BM-128 block cipher design; part 4,5,6 presents the  ...  BM-128 is developed on the basis of SDDO based on element F 2/2 which is very suitable for implementing on cheap hardware.  ...  Conclusion All main results include in this paper as follows: 1) Design operator is controlled with F 32/256 in according to the structure of CSPN on the basis of the controlled element of the same class  ... 
doi:10.14257/ijsia.2013.7.6.05 fatcat:y7aezbm2ajepfpzngkql5d77ue

New Class of Cryptographic Primitives and Cipher Design for Networks Security

Nikolay A. Moldovyan, Alexander A. Moldovyan, Michael A. Eremeev, Nicolas Sklavos
2006 International Journal of Network Security  
The paper develops the cipher design approach based on the use of data-dependent (DD) operations (DDOs).  ...  A new DDO-based cipher design is considered, which is more efficient for VLSI implementation than AES finalists and other known DDO-based ciphers.  ...  Eagle-128: A New Block Cipher Design The proposed cipher design, Eagle-128, is based on the combination of CSPNs with SPNs.  ... 
dblp:journals/ijnsec/MoldovyanMES06 fatcat:wlfbhwh2kff6teezdqj54oalje

An optimal low-power/high performance DDP-based Cobra-H64 cipher

A. Rjoub, M. Musameh, O. Koufopavlou
2007 Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications  
A new layout design for a data dependent permutation (DDP)-Cobra H64-bit cipher optimized for low-power and high speed operation is presented in this paper.  ...  Simulation results based on the layout level have confirmed the validity of the proposed technique, as well as confirmed that low power, speed and performance can be optimized through design at the layout  ...  The main hardware parts of Cobra H64 are: Control Permutation boxes, DDP (P32/96 , P32/96-1), Extension Box (E), Non-linear operation (G), Permutational Involution (I), and Switchable fixed permutation  ... 
doi:10.4108/icst.mobimedia2007.1915 dblp:conf/mobimedia/RjoubMK07 fatcat:tenrjyphnngv3bd4olumshz7mu

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

2021 KSII Transactions on Internet and Information Systems  
) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems.  ...  and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation  ...  To address those issues, the prominent solution focuses on improving the protection of cipher designs by distinct switch operations and functions, like the Data-Dependent Permutation-based constructions  ... 
doi:10.3837/tiis.2021.06.012 fatcat:4cdu2mcr3beebb736vvsuohl34

SPREAD: A Streaming-Based Partially Reconfigurable Architecture and Programming Model

Ying Wang, Xuegong Zhou, Lingli Wang, Jian Yan, Wayne Luk, Chenglian Peng, Jiarong Tong
2013 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
It supports dynamic computing resource allocation, runtime software/hardware switching, and streaming-based multithreaded management at the operating system level.  ...  efficiency than their implementations on state-ofthe-art graphics processing units.  ...  All running threads, whether hardware or software ones, are under the control of the extended operating kernel.  ... 
doi:10.1109/tvlsi.2012.2231101 fatcat:f6hdmxryzje3znxhh5rnrrt5u4

CONFISCA: An SIMD-Based Concurrent FI and SCA Countermeasure with Switchable Performance and Security Modes

Ehsan Aerabi, David Hély, Cyril Bresch, Athanasios Papadimitriou, Mahdi Fazeli
2021 Cryptography  
CONFISCA can on-the-fly switch between its two modes of operation: The High-Performance and High-Security by having only one instance of the cipher.  ...  This gives us the flexibility to trade performance/energy with security, based on the actual critical needs.  ...  For control-flow FI protection, one pair of the SIMD operations is devoted to computing a constant encryption (fixed plain-text).  ... 
doi:10.3390/cryptography5020013 fatcat:4jzgy34zerfx3he7pfnteutewq

LCASE: Lightweight Cellular Automata-based Symmetric-key Encryption

Somanath Tripathy, Sukumar Nandi
2009 International Journal of Network Security  
All components of LCASE are chosen to be cellular automata-based so as to achieve higher parallelism and simplify the implementation.  ...  We propose a lightweight block cipher that supports 128bit block size with 128-, 192-and 256-bit keys, to confirm with the Advanced Encryption Standard (AES) specification.  ...  Therefore, the design choices have been related to use CA-based components. LCASE uses second order RCA based on CA rule 30, CA skewed rule 30, CA skewed rule 45 and NCA based on CA rule 218.  ... 
dblp:journals/ijnsec/TripathyN09 fatcat:ghmmui5xdjdivlttcxpugroq6u

Low-power emerging memristive designs towards secure hardware systems for applications in internet of things

Nan Du, Heidemarie Schmidt, Ilia Polian
2021 Nano Materials Science  
In this review article, for achieving secure hardware systems in IoT, lowpower design techniques based on emerging memristive technology for hardware security primitives/systems are presented.  ...  circuit designs.  ...  From M-logic computing towards ciphers Many security techniques are based on cryptography.  ... 
doi:10.1016/j.nanoms.2021.01.001 fatcat:ellxqwgigvfizbtkgqznvpat44
« Previous Showing results 1 — 15 out of 58 results