Linear Layer Architecture Based on Cyclic Shift and XOR

Author:

Gorlov Lev1,Iavich Maksim2ORCID,Bocu Razvan3ORCID

Affiliation:

1. Faculty of Information Technology, Al-Farabi Kazakh National University, 71 Al-Farabi Avenue, Almaty 050040, Kazakhstan

2. Department of Computer Science, Caucasus University, P. Saakadze Street 1, Tbilisi 0102, Georgia

3. Faculty of Mathematics and Computer Science, Transilvania University of Brasov, Bulevardul Eroilor 29, 500036 Brașov, Romania

Abstract

One of the nodes of a block symmetric encryption algorithm is represented by a linear layer, the purpose of which is to distribute the mutual influence of bits within the processed data block. Several methods exist for constructing a linear layer, the most common of which are matrix multiplication operations and the permutation of bits. Both approaches have high computational complexity and are not equally effective for both hardware and software implementations. This paper presents an approach for constructing linear functions for block symmetric encryption algorithms utilizing cyclic shift, and bitwise addition operations are formulated. We provide a preliminary assessment of certain properties of such functions, including the branch number. This linear operation can accommodate binary words of any length, allowing for the design of an optimal linear layer for software or hardware architectures with any word size. Furthermore, the developed architecture allows for balancing the laboriousness of linear operations and related branch numbers. The proposed novel linear layer architecture facilitates the creation of fast lightweight encryption algorithms as well as robust classical algorithms with a high level of cryptographic strength. For efficient implementation on software and hardware platforms, no additional optimizations are required, as the proposed linear layer allows for achieving high performance in both cases.

Publisher

MDPI AG

Subject

Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)

Reference24 articles.

1. (2023, June 26). Federal Information Processing Standards Publication 197. Specification for the Advanced Encryption Standard (AES), Available online: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.

2. Daemen, J., and Rijmen, V. (2001, January 17–19). The wide trail design strategy. Proceedings of the Cryptography and Coding: 8th IMA International Conference, Cirencester, UK.

3. Nir, Y., and Langley, A. (2023, June 24). ChaCha20 and Poly1305 for IETF Protocols. RFC 7539. Available online: https://datatracker.ietf.org/doc/html/rfc7539.

4. Ray, B., Douglas, S., Jason, S., Stefan, T.C., Bryan, W., and Louis, W. (2013). The SIMON and SPECK Families of Lightweight Block Ciphers. Cryptol. ePrint Arch., Available online: https://ia.cr/2013/404.

5. Guo, Z., Liu, R., Wu, W., and Lin, D. (2016). Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers. IACR Trans. Symmetric Cryptol., 169–187. Available online: https://ia.cr/2016/1036.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3