scholarly journals Requirements for symmetric block encryption algorithms developed for software and hardware implementation

Author(s):  
Kairat Sakanuly Sakan ◽  
N. A. Kapalova ◽  
A. Haumen ◽  
O. T. Suleimenov
2021 ◽  
Vol 75 (3) ◽  
pp. 115-120
Author(s):  
N.A. Kapalova ◽  
◽  
A. Haumen ◽  

The paper deals with nonlinear transformations of well-known symmetric block algorithms such as AES, Kuznyechik, SM4, BelT, and Kalyna. A brief description of the substitution boxes for these algorithms is given. The properties of nonlinearity of the described substitution boxes are investigated with the calculation of the corresponding values. Based on the property of nonlinearity, a method for generating a dynamic substitution box is proposed. The purpose of this method is to generate dynamic substitution boxes (S-boxes) that change depending on the values of some parameter obtained from the secret key of the algorithm. Considering that linear and differential cryptanalysis uses known substitution boxes, the main advantage of the new method is that S-boxes are randomly key-dependent and unknown. Experiments were also carried out to implement this method. The resulting dynamic substitution boxes were tested for nonlinearity and the results were compared with the original nonlinearity values of the same substitution boxes.


2019 ◽  
Vol 10 (2) ◽  
pp. 181-191
Author(s):  
Vladimir Mikhailovich Fomichev ◽  
Alisa Mikhailovna Koreneva ◽  
Al'finur Ruslanovna Miftakhutdinova ◽  
Dmitrii Igorevich Zadorozhny

Исследуется класс нелинейных итеративных преобразований, обобщающих сеть Фейстеля и построенных на основе автономного регистра сдвига длины $n$ с $m$ обратными связями над множеством $32$-мерных двоичных векторов, $32 \geqslant n > m \geqslant 1$. Предложена интегральная характеристика предельной производительности шифрования, которая может применяться при обосновании выбора параметров конкретных блочных алгоритмов.


2013 ◽  
Vol 380-384 ◽  
pp. 2803-2806
Author(s):  
Xu Ming Lu ◽  
Wei Jie Wen ◽  
Hong Zhou Tan

To make rapid implementation and verification for the systems becomes important in frontend Application Specific Integrated Circuits. Therefore, a field programmable gate array based hardware/software codesign prototyping environment is proposed to simulate the software implementation and verify the hardware implementation of a baseband OFDM system. The system is implemented by software and hardware partitions, respectively. The analog radio frequency front-end module helps take a full insight into the actual baseband system performance. User datagram protocol is used for data transmission between these two partitions, and hence makes a complete baseband system. With the proposed codesign environment, the software simulation is running over real wireless channels, and the hardware implemental results can be flexibly processed in real time and enhances the design efficiency.


2012 ◽  
Vol 256-259 ◽  
pp. 2820-2825
Author(s):  
A Zadali Mohammad Kootiani ◽  
P Abedi

Differential power analysis (DPA) attack is an important threat that researchers spend great effort to make crypto algorithms resistant against DPA attacks. In order to determine whether the hardware has DPA leakage before manufacturing, an accurate power model in digital simulation has been generated. FPGAs Arrays are attractive options for hardware implementation of encryption algorithms. In this paper, we show generated power model by using integer numbers whole DES’s rounds vs. S-Box alone, and this method gives more realistic results to determine the effectiveness of the improvements protect whole DES rather than in which only informer elements in the DES round. In particular this allows the user to isolate some parts of its implementation in order to analyze information leakages directly linked to them. We review s-box because it’s get 2kbit or 20% CLB slice from FPGA to implement DES or TDES. This paper try to identify role of Sbox in DPA.


2020 ◽  
Vol 19 (3) ◽  
pp. 5-22
Author(s):  
Ferenc Koczka

In ensuring the operation of an IT system, it is essential to maintain the data’s confidentiality and integrity, which is based on some encryption processes. Encryption procedures are based on algorithms, the theory of which is given by cryptography. Due to their complexity, they are often hardly understandable not only to an average person but also to the majority of professionals who are familiar with IT. The algorithms used are not eternal; various designs or implementation errors or even performance gains from computer hardware improvements make one time high achieving algorithms obsolete and easily hackable. Strong algorithms can be circumvented in alternative ways, the necessary software and hardware infrastructure can already be built from personal computing devices. I tested its effectiveness on two different password databases: with the success of hacking university passwords, I prove that it is possible to circumvent strong algorithms with simple methods. Modern encryption algorithms have a relatively long life cycle and they become obsolete slowly. The construction of the quantum computer creates a new situation, which requires a number of procedures to be eliminated and its parameters to be modified or protected by additional methods. As it is an impossible task to modernise the encryption algorithms of all IT systems operating today, preparations must be started as soon as possible so that the new situation can be handled, at least for critical systems. In my article, I would like to draw attention to the weaknesses of encryption methods, present a possible method of circumventing the cryptographic methods currently in use, demonstrate the operation of a quantum computer and some algorithms relevant to the topic.


2017 ◽  
Vol 13 (03) ◽  
pp. 75
Author(s):  
Xiaodong Hu

<span style="font-family: 'Times New Roman',serif; font-size: 12pt; mso-fareast-font-family: SimSun; mso-fareast-theme-font: minor-fareast; mso-ansi-language: EN-US; mso-fareast-language: ZH-CN; mso-bidi-language: AR-SA;">Based on the investigation and analysis of the current status of pharmaceutical cold chain at home and abroad, this paper comes up with a solution for pharmaceutical cold chain temperature monitoring, develops an intelligent temperature recorder based on wireless sensor network technology, and makes a detailed introduction to the software and hardware implementation of the wireless sensor nodes of the recorder and the monitoring terminal. Besides, the author tests the performance of the recorder multiple times. The results show that the design basically fulfils the expected goals.</span>


Sign in / Sign up

Export Citation Format

Share Document