Linear Layer Architecture Based on Cyclic Shift and XOR
Author:
Gorlov Lev1, Iavich Maksim2ORCID, Bocu Razvan3ORCID
Affiliation:
1. Faculty of Information Technology, Al-Farabi Kazakh National University, 71 Al-Farabi Avenue, Almaty 050040, Kazakhstan 2. Department of Computer Science, Caucasus University, P. Saakadze Street 1, Tbilisi 0102, Georgia 3. Faculty of Mathematics and Computer Science, Transilvania University of Brasov, Bulevardul Eroilor 29, 500036 Brașov, Romania
Abstract
One of the nodes of a block symmetric encryption algorithm is represented by a linear layer, the purpose of which is to distribute the mutual influence of bits within the processed data block. Several methods exist for constructing a linear layer, the most common of which are matrix multiplication operations and the permutation of bits. Both approaches have high computational complexity and are not equally effective for both hardware and software implementations. This paper presents an approach for constructing linear functions for block symmetric encryption algorithms utilizing cyclic shift, and bitwise addition operations are formulated. We provide a preliminary assessment of certain properties of such functions, including the branch number. This linear operation can accommodate binary words of any length, allowing for the design of an optimal linear layer for software or hardware architectures with any word size. Furthermore, the developed architecture allows for balancing the laboriousness of linear operations and related branch numbers. The proposed novel linear layer architecture facilitates the creation of fast lightweight encryption algorithms as well as robust classical algorithms with a high level of cryptographic strength. For efficient implementation on software and hardware platforms, no additional optimizations are required, as the proposed linear layer allows for achieving high performance in both cases.
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference24 articles.
1. (2023, June 26). Federal Information Processing Standards Publication 197. Specification for the Advanced Encryption Standard (AES), Available online: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf. 2. Daemen, J., and Rijmen, V. (2001, January 17–19). The wide trail design strategy. Proceedings of the Cryptography and Coding: 8th IMA International Conference, Cirencester, UK. 3. Nir, Y., and Langley, A. (2023, June 24). ChaCha20 and Poly1305 for IETF Protocols. RFC 7539. Available online: https://datatracker.ietf.org/doc/html/rfc7539. 4. Ray, B., Douglas, S., Jason, S., Stefan, T.C., Bryan, W., and Louis, W. (2013). The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptol. ePrint Arch., Available online: https://ia.cr/2013/404. 5. Guo, Z., Liu, R., Wu, W., and Lin, D. (2016). Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers. IACR Trans. Symmetric Cryptol., 169–187. Available online: https://ia.cr/2016/1036.
|
|