Skip to main content

2022 | Buch

Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers

insite
SUCHEN

Über dieses Buch

This book presents the use of tweakable block ciphers for lightweight authenticated encryption, especially applications targeted toward hardware acceleration where such efficient schemes have demonstrated competitive performance and strong provable security with large margins. The first part of the book describes and analyzes the hardware implementation aspects of state-of-the-art tweakable block cipher-based mode ΘCB3. With this approach, a framework for studying a class of tweakable block cipher-based schemes is developed and two family of authenticated encryption algorithms are designed for the lightweight standardization project initiated by the National Institute of Standards and Technology (NIST): Romulus and Remus. The Romulus family is a finalist for standardization and targets a wide range of applications and performance trade-offs which will prove interesting to engineers, hardware designers, and students who work in symmetric key cryptography.

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction and Background
Abstract
In this monograph, we go on a journey through the state-of-the art of hardware-oriented symmetric-key cryptography using block ciphers and tweakable-block ciphers. Before we start the aforementioned journey, it is important to highlight what expectations the reader have besides the technical contributions. If a reader wants to leave this monograph with only one lesson learned, it is that hardware design and cryptography must go hand in hand, where the design of hardware-oriented cryptographic algorithms must be assisted by experimentation, measurements and practical implementations, as many assumptions on the performance that sound nice on paper usually fail in practice. At the same time, sacrificing qualitative or quantitative security considerations for more efficient schemes can sometimes lead to significant security issues.
Mustafa Khairallah
Chapter 2. On the Cost of ASIC Hardware Crackers
Abstract
Setting security goals requires understanding the current possibilities and limitations in terms of attacks can be considered practical and what cannot. To do so, this chapter discusses the hardware implementation of a group of cryptanalytic attacks against SKE primitives. As a case study, we consider attacks against once of the recently broken primitives, SHA-1. It is an attempt at answering three important research questions
Mustafa Khairallah
Chapter 3. Hardware Performance of the CB3 Algorithm
Abstract
In this chapter, we study the hardware implementation of SPNs and the \(\Theta \mathsf{CB3} \) TBC-based mode. The contents of this chapter have been published in the International Conference on Cryptology in India (Indocrypt) 2017 [1].
Mustafa Khairallah
Chapter 4. Arguments for Tweakable Block Cipher-Based Cryptography
Abstract
As discussed in Sect. 1.​3, a TBC is a variant of a BC that accepts a public tweak to change its behavior. TBC-based AEAD designs have a lot of nice performance and security features that we will discuss in this chapter. First, we give an early history of TBC designs in Sect. 4.1. Then, we discuss the impact of the TWEAKEY framework in Sect. 4.2.
Mustafa Khairallah
Chapter 5. Analysis of Lightweight BC-Based AEAD
Abstract
In this chapter we discuss some of the security aspect of (T)BC-based lightweight AEAD schemes.
Mustafa Khairallah
Chapter 6. Romulus: Lighweight AEAD from Tweakable Block Ciphers
Abstract
In this chapter, we present the NIST lightweight finalist, Romulus. It is a family of lightweight, very efficient, and highly-secure algorithms; including, but not restricted to, NAE (Romulus-N) and MRAE (Romulus-M) schemes.
Mustafa Khairallah
Chapter 7. Remus: Lighweight AEAD from Ideal Ciphers
Abstract
Remus can be seen as a more aggressive brother of Romulus. It is a family of authenticated encryption with associated data (AEAD) schemes based on a tweakable block cipher (TBC) Skinny. Remus consists of two families, a nonce-based AE (NAE) Remus-N and a nonce misuse-resistant AE (MRAE) Remus-M.
Mustafa Khairallah
Chapter 8. Hardware Design Space Exploration of a Selection of NIST Lightweight Cryptography Candidates
Abstract
Round 2 of the NIST lightweight cryptography standardization project lasted till 29 March, 2021 and resulted in the selection of 10 candidates as the finalists.
Mustafa Khairallah
Chapter 9. Conclusions
Abstract
In this monograph, we studied the topic of designing lightweight hardware-oriented AEAD algorithms from TBCs. We studied the hardware implementation of SKE primitives and the design, implementation and security of TBC-based AEAD algorithms compared to other design approaches.
Mustafa Khairallah
Metadaten
Titel
Hardware Oriented Authenticated Encryption Based on Tweakable Block Ciphers
verfasst von
Mustafa Khairallah
Copyright-Jahr
2022
Verlag
Springer Singapore
Electronic ISBN
978-981-16-6344-4
Print ISBN
978-981-16-6343-7
DOI
https://doi.org/10.1007/978-981-16-6344-4

Neuer Inhalt