International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-6, March 2019 A Review on the Design of Lightweight Symmetric Block Ciphers for Cyber Physical Systems Prathiba A, Kanchana Bhaaskaran V S Every operation involved in the cipher decides its security Abstract: Selection and deployment of security hardware for properties as well the performance characteristics. Existing Cyber Physical Systems (CPS) necessitate a smart choice. studies focus on either structural composition or involved Lightweight security algorithms are viable choices for such operations in algorithms to achieve a demanded level of applications. The study presented, will give an overview of security. The literature lacks a study relating design, security lightweight symmetric block cipher algorithms and provide a and hardware performance of the SPN type of block ciphers summary for algorithm designers of the parameters that influence the design of a cipher algorithm and its impact on security and [7], [8]. A comparative analysis of design, security and implementation. Comprehensive review of lightweight, symmetric, hardware architecture as three corners is the motive of the Substitution Permutation Network (SPN) type of block ciphers review presented. Overview of the tradeoff parameters is aids the lightweight cryptographic algorithm designer in selection shown in Fig. 1. of operations suitable for Cyber Physical Systems. An overall survey on existing lightweight SPN type symmetric block ciphers pertaining to design, security and hardware performance as the Cipher three corners that trade-off cipher design is made. The design Design composition of cipher based on security and hardware cost is the highlight of this paper. Index Terms: Lightweight block ciphers, security, performance Choice of Design and design. Components Composition of Linear and I. INTRODUCTION Nonlinear Operations Cyber Physical systems (CPS) demand a compact and Type of Architecture lightweight security deployment [1]. The way to establish security is through the deployment of lightweight Security Performance cryptographic algorithms [2] – [6]. Block ciphers are of two types, namely, the Substitution Permutation Network (SPN) type and the Feistel Network (FN) type. Block ciphers of Fig.1. Survey overview SPN type operate on a block of data of fixed size ‘n’, where Composition of encryption schedule and key schedule are n=32, 64 and so on. Feistel type of ciphers subdivides the compared among the considered lightweight ciphers. Further, data block into halves and operates separately on each block. the bounds on the different types of attacks, namely, linear Preferable choice is the use of block ciphers with less and differential cryptanalysis attacks, key related attacks, complexity, better throughput and reduced area occupancy in integral attacks, algebraic attacks, slide attacks, and statistical comparison against the stream ciphers. Block ciphers rely saturation attacks have also been compared. The bounds of upon two principles, confusion and diffusion for establishing these attacks and their resistance to the attacks provide security. Confusion should establish complex relationship cumulative information on dependence of every operation on between plain and cipher texts. Diffusion is a property in the security of the cipher to the algorithm designers. which a single bit change in plain text should affect a Additionally, the motive of lightweight cryptography is to significant number of bits of resultant cipher text . SPN block provide adequate security to miniature devices which are ciphers operating on fixed block size are considered for the constrained in area, battery life and computation power. review. Blocks of information transfer are primarily involved Hardware implementation of lightweight ciphers plays a in the real-time applications. Parameters to evaluate a cipher major role in resource utilization. An overview of existing are security and hardware/software performance. Structural hardware architectures and its implementation for the design, chosen number of rounds, linear and non-linear lightweight ciphers are also presented in this paper. operation in algorithm impacts the security properties. Revised Manuscript Received on March 26, 2019. II. SHORT DESCRIPTION OF CIPHERS A Prathiba, School of Electronics Engineering, VIT University, Chennai, India. This section presents the specifications of the chosen V S Kanchana Bhaaskaran, School of Electronics Engineering, VIT iterative lightweight symmetric block ciphers of SPN type. University, Chennai, India. Published By: Retrieval Number: F2123037619/19©BEIESP Blue Eyes Intelligence Engineering & 294 Sciences Publication A Review on the Design of Lightweight Symmetric Block Ciphers for Cyber Physical Systems Type of the encryption schedule and the key schedule poses cipher will give a better picture on the security as well as on an idea of the selection of the type of hardware architecture. the implementation. The structural comparison among the The non-linear operation in SPN ciphers is substitution and ciphers with the listing of the linear and the nonlinear linear operation is permutation. The block ciphers are operations involved in the chosen ciphers are presented in normally iterated ciphers where in the encryption schedule Table 9. The comparison concludes that the linear and the will have a set of round operations iterated for the round non-linear operation involved in cipher algorithm and the times specified in the algorithm. Every round operation is iterated number of rounds decide the security properties. Also made key dependent on the round keys, as generated by the the hardware performance metrics namely, speed, power and key scheduling algorithm. Linear operations, namely, area are limited by the design composition. Ciphers compose permutation, mix columns and shift rows will have less of linear and nonlinear operations. The non-linear S-box is impact on the hardware implementation since they are significant in deciding the security and cost of realized without any gates. S-box specification of the SPN implementation. It is the primary non-linear operation in the ciphers under consideration are presented in Table 1 through security algorithms. Design of S-box quantify the critical 6. The specifications compared in Table 7 shows the path delay and resource occupancy of the cipher to a larger collective summary of the cipher specifications. extent. The operations involved in encryption datapath and the key schedule for the specified ciphers are given in Table 8. Also, the type of linear and the non-linear operation in the Table 1 mCRYPTON S-boxes X 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 S0 4 F 3 8 D A C 0 B 5 7 E 2 6 1 9 S1 1 C 7 A 6 D 5 3 F B 2 0 8 4 9 E S2 7 E C 2 0 9 D A 3 F 5 8 6 4 B 1 S3 B 0 A 7 D 6 4 2 C E 3 9 1 5 F 8 Table 2 KLEIN S-box X 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 S 7 4 A 9 1 F B 0 C 3 2 6 8 E D 5 Table 3 NOEKEON S-box X 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 S 7 A 2 C 4 8 F 0 5 9 1 E 3 D B 6 Table 4 PRESENT S-box X 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 S C 5 6 B 9 0 A D 3 E F 8 4 7 1 2 Table 5 PRINCE S-box X 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 S B F 3 2 A C 9 1 6 7 8 0 E 5 D 4 Table 6 PRINT S-box X 0 1 2 3 4 5 6 7 S [x] 0 1 3 6 7 4 5 2 Table 7 Comparison of specifications of SPN type symmetric lightweight block ciphers Cipher Year Designer Rounds Block Key size Applications/Design size (bits) aim (bits) Published By: Retrieval Number: F2123037619/19©BEIESP Blue Eyes Intelligence Engineering & 295 Sciences Publication A Review on the Design of Lightweight Symmetric Block Ciphers for Cyber Physical Systems mCRYPTON 2006 Lim and 12 128 64,96,128 miniature [9] Korkishko CRYPTON/compact implementation in hardware and software EPCBC [10] 2011 Huihui 32 48, 96 Electronic Product Yap et al. 96 Code/generalized PRESENT, PRESENT-n KLEIN [11] 2012 Gong et 12,16,24 64 64,80,96 Wireless sensors and al. RFID tags/software performance on legacy sensor nodes LED [12] 2011 Guo et al. 64-bit 64 64,80,96,128 RFID tags/ ultra key, light key schedule, s=8. compact hardware, 128-bit reasonable key, performance in S=12 software NOEKEON[13] 2008 Daemen 16 128 128 Smart cards/suitable et al. for multiple platforms, resistant to implementation attacks PRESENT [14] 2008 Rolfes et 31 64 80, 128 RFID tags, al. Low passive sensor networks PRINCE [15] 2010 Knudsen 12 64 128 Real-time security purposes PRINT[16] 2007 Lars 48,96 48,96 80,160 IC Printing, Knudsen electronic product et al. code. Table 8 Comparison of operations in encryption schedule and key schedule Cipher Encryption schedule Encryption Key schedule operations schedule operations type Add round key,Sub Round Key,S-box mCRYPT Nibbles, layer SPN ON Rotate Nibbles,Mix Shifting Nibbles Add round-key,S-box Shifting,S-box layer EPCBC SPN layer Round counter P-layer Add round Key,Sub ith Round Nibbles Key,Shifting KLEIN SPN Rotate Nibbles,Mix S-box layer,Round Nibbles counter Add round key,S-box layer LED SPN User supply Key Shift rows,Mix columns Add round NOEKEO ey,Theta,Pi1,Pi2 SPN User supplied Key N Gamma Published By: Retrieval Number: F2123037619/19©BEIESP Blue Eyes Intelligence Engineering & 296 Sciences Publication International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-7, Issue-6, March 2019 Add round-key, Shifting S-box layer PRESEN S-box layer SPN Round counter T P-layer Add round key,S-box layer PRINCE SPN User supplied Key M/M’ – layer,Round counter Key XOR, Linear diffusion
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages12 Page
-
File Size-