Information Technology Reference
In-Depth Information
Encryption and Data Dependent Permutations:
Implementation Cost and Performance Evaluation
N. Sklavos 1 , A.A. Moldovyan 2 , and O. Koufopavlou 1
1 Electrical & Computer Engineering Department
University of Patras, Patras 26500, Greece
nsklavos@ee.upatras.gr
2 Specialized Center of Program Systems, SPECTR,
Kantemirovskaya Str. 10, St. Petersburg 197342, Russia
ma@cobra.ru
Abstract. Recently, Data Dependent Permutations (DDP) have attracted the in-
terest of cryptographers and ciphers designers. SPECTR-H64 and CIKS-1 are
latest published powerful encryption algorithms, based on DDP transforma-
tions. In this paper, the implementation cost in different hardware devices
(FPGA and ASIC) for DDP is introduced. In addition, the performance of these
data transformation components is presented. Detailed analysis is shown, in
terms of covered area, frequency, and throughput for DDP VLSI integration.
Furthermore, two different architectures for hardware implementation of CIKS-
1 and SPECTR-H64 are proposed. The first, based on full rolling technique
minimizes the area resources. The second uses a pipelined development design
and has high-speed performance. Both architectures have been implemented in
FPGA and ASIC devices.
Keywords: DDP Transformations, CIKS-1, SPECTR-H64, Hardware Imple-
mentations, Block Cipher.
1
Introduction
Security is a primary requirement of any wired and wireless communication. Encryp-
tion algorithms are meant to provide secure communications applications. New en-
cryption algorithms have to operate efficiently in a variety of current and future ap-
plications, doing different encryption tasks. All hardware implementations have to be
efficient, with the minimum allocated logic gates. This means simplicity in cipher's
architectures with enough “clever” data transformation components. A communica-
tion protocol implementation, demands low power devices and fast computation
components. The ciphers of the near future have to be key agile. Many applications
need a small amount of text to be encrypted with keys that are frequently changed.
Many well know applications, like IPsec, use this way of algorithm's operation. Al-
though the most widely used mode of operation is encryption with the same key for
all the amount of transport data, the previous mode is also very useful for future ap-
plications. Ciphers requiring subkeys precomputation have a lower key agility due to
Search WWH ::




Custom Search