×

zbMATH — the first resource for mathematics

Efficient design strategies based on the AES round function. (English) Zbl 1387.94085
Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 334-353 (2016).
Summary: We show several constructions based on the AES round function that can be used as building blocks for MACs and authenticated encryption schemes. They are found by a search of the space of all secure constructions based on an efficient design strategy that has been shown to be one of the most optimal among all the considered. We implement the constructions on the latest Intel’s processors. Our benchmarks show that on Intel Skylake the smallest construction runs at 0.188 c/B, while the fastest at only 0.125 c/B, i.e. five times faster than AES-128.
For the entire collection see [Zbl 1344.68014].

MSC:
94A60 Cryptography
Software:
ASC-1; Gurobi; LEX; SIMON
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] 1.Biryukov, A.: The design of a stream cipher LEX. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 67-75. Springer, Heidelberg (2007) · Zbl 1161.94387
[2] 2.Bogdanov, A., Lauridsen, M.M., Tischhauser, E.: Comb to pipeline: fast software encryption revisited. In: Leander, G. (ed.) FSE 2015. LNCS, vol. 9054, pp. 150-171. Springer, Heidelberg (2015) · Zbl 1367.94303
[3] 3.Bogdanov, A., Mendel, F., Regazzoni, F., Rijmen, V., Tischhauser, E.: ALE: AES-based lightweight authenticated encryption. In: Moriai, S. (ed.) FSE 2013. LNCS, vol. 8424, pp. 447-466. Springer, Heidelberg (2014) · Zbl 1321.94042
[4] 4.Borghoff, J., Knudsen, L.R., Stolpe, M.: Bivium as a mixed-integer linear programming problem. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 133-152. Springer, Heidelberg (2009) · Zbl 1234.94031
[5] 5.CAESAR. Competition for Authenticated Encryption: Security, Applicability, and Robustness.
[6] 6.Daemen, J., Rijmen, V.: The Design of Rijndael: ALE - The Advanced Encryption Standard. Springer, Heidelberg (2002) · Zbl 1065.94005
[7] 7.Daemen, J., Rijmen, V.: A new MAC construction
[8] 8.Daemen, J., Rijmen, V.: The MAC function Pelican 2.0. Cryptology ePrint Archive, report 2005/088 (2005)
[9] 9.Derbez, P., Fouque, P.-A., Jean, J.: Improved key recovery attacks on reduced-round · Zbl 1306.94044
[10] 10.Gurobi Optimization, Inc.: Gurobi Optimizer Reference Manual (2015)
[11] 11.Jakimoski, G., Khajuria, S.: ASC-1: an authenticated encryption stream cipher. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 356-372. Springer, Heidelberg (2012) · Zbl 1292.94083
[12] 12.Käsper, E., Schwabe, P.: Faster and timing-attack resistant AES-GCM. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 1-17. Springer, Heidelberg (2009) · Zbl 1290.94102
[13] 13.Khovratovich, D., Rechberger, C.: The LOCAL attack: cryptanalysis of the authenticated encryption scheme ALE. In: Lange, T., Lauter, K., Lisoněk, P. (eds.) SAC 2013. LNCS, vol. 8282, pp. 174-184. Springer, Heidelberg (2014) · Zbl 1339.94077
[14] 14.Li, L., Jia, K., Wang, X.: Improved single-key attacks on 9-round AES-192/256. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 127-146. Springer, Heidelberg (2015) · Zbl 1360.94317
[15] 15.Mala, H., Dakhilalian, M., Rijmen, V., Modarres-Hashemi, M.: Improved Impossible differential cryptanalysis of 7-round AES-128. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 282-291. Springer, Heidelberg (2010) · Zbl 1253.94060
[16] 16.Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57-76. Springer, Heidelberg (2012) · Zbl 1292.94118
[17] 17.Nikolić, I.: Tiaoxin-346. Submission to the CAESAR Competition (2014)
[18] 18.Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X., Song, L.: Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 158-178. Springer, Heidelberg (2014) · Zbl 1306.94093
[19] 19.Wu, H., Preneel, B.:
[20] 20.Wu, S., Wu, H., Huang, T., Wang, M., Wu, W.: Leaked-state-forgery attack against the authenticated encryption algorithm ALE. In: Sako, K., Sarkar, P. (eds.) ASIACRYPT 2013, Part I. LNCS, vol. 8269, pp. 377-404. Springer, Heidelberg (2013) · Zbl 1327.94086
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.