Scalable PP-1 block cipher

Scalable PP-1 block cipher A totally involutional, highly scalable PP-1 cipher is proposed, evaluated and discussed. Having very low memory requirements and using only simple and fast arithmetic operations, the cipher is aimed at platforms with limited resources, e.g., smartcards. At the core of the cipher's processing is a carefully designed S-box. The paper discusses in detail all aspects of PP-1 cipher design including S-box construction, permutation and round key scheduling. The quality of the PP-1 cipher is also evaluated with respect to linear cryptanalysis and other attacks. PP-1's concurrent error detection is also discussed. Some processing speed test results are given and compared with those of other ciphers.

[1]  Ewa Idzikowska,et al.  Concurrent Error Detection in S-boxes , 2007, Int. J. Comput. Sci. Appl..

[2]  William Millan,et al.  On Linear Redundancy in the AES S-Box , 2002, IACR Cryptol. ePrint Arch..

[3]  William Millan,et al.  Linear Redundancy in S-Boxes , 2003, FSE.

[4]  Ewa Idzikowska,et al.  Analysis of the influence of errors on the encryption and decryption in PP-1 block cipher , 2007 .

[5]  Anna Grocholewska-Czurylo,et al.  Involutional Block Cipher for Limited Resources , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[6]  Krzysztof Chmiel On Differential and Linear Approximation of S-box Functions , 2006, Biometrics, Computer Security Systems and Artificial Intelligence Applications.

[7]  Alex Biryukov,et al.  Analysis of Involutional Ciphers: Khazad and Anubis , 2003, FSE.

[8]  Krzysztof Chmiel Distribution of the best nonzero differential and linear approximations of s-box functions , 2006 .

[9]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[10]  Thomas Johansson,et al.  Fast Software Encryption , 2003, Lecture Notes in Computer Science.

[11]  Thomas Johansson Fast Software Encryption: 10th International Workshop, Fse 2003, Lund, Sweden, February 2003: Revised Papers (Lecture Notes in Artificial Intelligence, 2887) , 2003 .

[12]  Israel Koren,et al.  Error Analysis and Detection Procedures for a Hardware Implementation of the Advanced Encryption Standard , 2003, IEEE Trans. Computers.

[13]  D. Chaum,et al.  Di(cid:11)erential Cryptanalysis of the full 16-round DES , 1977 .

[14]  Joan Daemen,et al.  AES Proposal : Rijndael , 1998 .

[15]  Israel Koren,et al.  Concurrent fault detection in a hardware implementation of the RC5 encryption algorithm , 2003, Proceedings IEEE International Conference on Application-Specific Systems, Architectures, and Processors. ASAP 2003.

[16]  Krzysztof Chmiel On Intermediate Evaluation of Block Ciphers , 2007, Advances in Information Processing and Protection.