Block Ciphers

Block Ciphers

CENTRE FOR NEWFOlf.lo'DLA!'ID STL'DIES TOTAL OF 10 PAGES ONLY MAY BE XFROXF.O (Withool Autbor'sl,crmwlon) Library and Bibliotheque et 1+1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de !'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A ON4 Ottawa ON K1A ON4 Canada Canada Your file Votre reference ISBN: 0-612-99046-X Our file Notre reference ISBN: 0-612-99046-X NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a Ia Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I' Internet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve Ia propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni Ia these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation. reproduced without the author's permission. In compliance with the Canadian Conformement a Ia loi canadienne Privacy Act some supporting sur Ia protection de Ia vie privee, forms may have been removed quelques formulaires secondaires from this thesis. ont ete enleves de cette these. While these forms may be included Bien que ces formulaires in the document page count, aient inclus dans Ia pagination, their removal does not represent il n'y aura aucun contenu manquant. any loss of content from the thesis. ...... Canada IMPLEMENTATION ANALYSIS OF BLOCK CIPHER COMPONENTS AND STRUCTURES by © Lu Xiao A thesis submitted to the School of Graduate Studies in partial fulfilment of the requirements for the degree of Doctor of Philosophy Faculty of Engineering and Applied Science Memorial University of Newfoundland December 2003 St. John's Newfoundland Abstract This thesis analyzes the implementation and performance characterization of sym­ metric key block ciphers. In particular, we study block ciphers which consist of Substitution-boxes (S-boxes) and Maximum Distance Separable (MDS) mappings. New mechanisms are proposed to evaluate the performance of block ciphers in terms of complexity and security for both hardware and software implementations. Con­ figured with parameterized components, many cipher cases are derived from two cipher structures, a nested Substitution-Permutation Network (SPN) and a class of Feistel networks. In our study of each case, the hardware complexity and speed are evaluated by considering a gate network consisting of one- or two-input logic gates, which is suitable for an Application-Specific Integrated Circuit (ASIC) realization. The software complexity (in terms of both speed and memory requirements) is eval­ uated through table lookup implementations, which is a classical approach used for fast software implementations. The results of the complexity evaluation are verified with implementations using 0.18 p,m and 0.35 p,m CMOS technologies for hardware and C/C++ compilers for software. Cipher security, in the form of resistance to differential and linear attacks, is used to normalize the performance in the analy­ sis. Because the discussed structures are similar to many existing ciphers such as the Advanced Encryption Standard (AES) and Camellia, this mechanism enables us i to study the efficiency of existing and new ciphers through a wide comparison of security, performance, and implementation methods. In addition to differential and linear cryptanalysis, we also examine integral, eX­ tended Sparse Linearization (XSL), and power attacks that may be applied to block ciphers. The XSL attack is discussed with respect to its effectiveness on the various studied cipher structures. Finally, a simple power analysis attack is implemented on Camellia's key schedule in the circumstance where the processor leaks Hamming weight information and the influence of the attack on the design of key schedules is explored. ii Acknowledgments First of all, I am deeply indebted to my supervisor, Dr. Howard M. Heys, for his guidance, encouragement, and patience in every part of this work. It is my fortune to be his student and as a supervisor he has done everything he could to benefit my work. I am very grateful to Dr. Ramachandran Venkatesan and Dr. Theodore S. Norvell, for being my supervisor committee members, giving time and support all along, and teaching me courses. I would also like to thank Dr. Paul Gillard and Dr. John Robinson for teaching me courses. I am grateful for this study opportunity provided by the Faculty of Engineering and Applied Science. Particularly, thanks to Dr. M.R. Haddara, Dr. Ray Gosine, and Moya Crocker in the Associate Dean Office who have helped me a lot during my graduate studies. The financial support granted by the School of Graduate Studies is highly appreciated. I am also grateful to my wonderful colleagues and friends in the Computer Engi­ neering Research Laboratories for their help and the good times, particularly Reza Shahidi who arranges the lab activities so pleasantly. In addition, I would like to thank Nolan White in the Department of Computer Science for his help during the utilization of VLSI CAD tools. iii An important thank you goes to my dear wife, Kai Zhang, for her sincere love and trust in this adventure. Finally, I would like to thank my parents and sister in China, whose support and encouragement throughout my studies have always been of great help. iv Contents Abstract i Acknowledgments iii Table of Contents v List of Tables X .. List of Figures Xll 1 Introduction 1 1.1 Motivation . 2 1.2 Thesis Outline . 5 2 Background of Cryptography 7 2.1 Encryption and Cryptosystems 7 2.2 Block Ciphers . 9 2.2.1 Product Ciphers 10 2.2.2 Cipher Components . 11 2.2.3 Cipher Structures . 14 2.2.4 Examples . 17 v 2.3 Cryptanalysis ........... 22 2.3.1 Differential Cryptanalysis 23 2.3.2 Linear Cryptanalysis 26 2.3.3 Integral Cryptanalysis 30 2.3.4 Implementation Attacks 32 2.3.5 Other Attacks . 34 2.4 Block Cipher Implementations . 34 2.4.1 Hardware Implementations . 34 2.4.2 Software Implementations 38 2.5 Summary I I I 0 I I I I I I I I I 39 3 Hardware Design and Analysis of Block Cipher Components 40 3.1 Optimized MDS Mappings for Hardware 42 3.1.1 MDS Mappings . 42 3.1.2 Bit-Parallel Multipliers . 43 3.1.3 Complexity of MDS Mappings . 45 3.1.4 Three Types of Matrices . 45 3.1.5 The Optimization Method 46 3.1.6 MDS Search Results 48 3.1.7 Synthesis Results . 51 3.2 General Hardware Model of Invertible S-boxes 53 3.2.1 Biham's Method to Simplify S-box Circuits 53 3.2.2 Decoder-Switch-Encoder Model 53 3.2.3 S-box Complexity . 59 3.3 Efficient AES Encryption Implementations 61 vi 3.3.1 Design I . 63 3.3.2 Design II . 64 3.3.3 Implementation Results 67 3.4 Summary . 68 4 Hardware Performance Characterization of Cipher Structures 70 4.1 Studied Cipher Structures 71 4.1.1 Nested SPNs ... 71 4.1.2 A Class of Feistel Networks 76 4.2 Comparison of Hardware Performance 78 4.2.1 Performance Measures . 78 4.2.2 Hardware Performance of Nested SPNs 81 4.2.3 Hardware Performance of Feistel Networks 86 4.2.4 Synthesis Results 89 4.3 Summary . 90 5 Software Performance Characterization of Cipher Structures 92 5.1 Table Lookup Implementations 93 5.1.1 Cases with 8 x 8 S-boxes 94 5.1.2 Cases with 4 x 4 S-boxes 96 5.2 Software Performance Comparison. 98 5.2.1 Time Performance Metric 98 5.2.2 Comparison of Nested SPNs 99 5.2.3 Comparison of Feistel Networks 102 5.2.4 Experimental Results . 105 5.3 Alternative Implementations . 107 vii 5.3.1 Bitslice Implementations 107 5.3.2 Power Implementations. 109 5.3.3 General Comparison of Methods. 111 5.4 Summary . 111 6 Applicability of XSL Attacks 113 6.1 Introduction to XSL Attacks . 114 6.2 Effectiveness of the Attack .. 118 6.3 Applicability to Cipher Structures . 119 6.4 Summary . 124 7 Simple Power Attacks on Cipher Key Schedules 125 7.1 Camellia's 128-Bit Key Schedule . 126 7.2 Hamming Weight Attack . 128 7.2.1 Basic Power Leakage Model 128 7.2.2 Requirements for the Attack . 130 7.2.3 Attack Against Camellia Subkey Generation 131 7.2.4 Attack Against the Derivation of K A . 133 7.2.5 Extension to 192-Bit and 256-Bit Key Schedules . 135 7.3 Two Variants of the Attack with Robustness to Measurement Errors. 136 7.3.1 Noisy Power Leakage Model . 137 7.3.2 Attack Variant 1 Robust Against Small Noise 138 7.3.3 Attack Variant 2 Robust Against Wide Range of Noise 139 7.4 General Susceptibility Evaluation 141 7.5 Countermeasures 143 7.6 Summary . 144 viii 8 Conclusions 146 8.1 Contributions 146 8.2 Recommendations for Future Research 149 References 151 A MDS Searching Results 166 B Matrices Used for AES Design II 168 ix List of Tables 2.1 Mapping Table of a 4x4 S-box (in hexadecimal) .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    193 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us