Hybrid Model in the Block Cipher Applications for High-speed Communications Networks

The article proposes two different designs for the new block cipher algorithm of 128-bit block size and key lengths of 128-bit or 192-bit or 256-bit. The basic cipher round is designed in a parallel model to help improve the encryption/decryption speed. The differences of this design compared to the previous one developed on Switchable Data Dependent Operations (SDDOs) lies in the hybrid of the controlled elements (CEs) in the structure. Each design has a specific strength that makes the selection more compatible with the objectives of each particular application. The designs all meet the high security standards and possess the ability to fight off the attacks currently known. The designs match the limited environment of the wireless network by integrating effectively when implemented on Field-programmable gate array (FPGA) with both iterative and pipeline architectures for high effective integration.

[1]  Seokhie Hong,et al.  Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H , 2004, INDOCRYPT.

[2]  Naixue Xiong,et al.  Cryptanalysis of the XO-64 Suitable for Wireless Systems , 2017, Wirel. Pers. Commun..

[3]  Pham Manh Tuan,et al.  New Block Ciphers for Wireless Moblile Netwoks , 2016 .

[4]  Seokhie Hong,et al.  Related-Key Amplified Boomerang Attacks on KT-64 and MD-64 Suitable for Wireless Sensor Networks , 2013 .

[5]  N.D. Goots,et al.  Fast DDP-based ciphers: from hardware to software , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[6]  Daniel G. Costa,et al.  Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions , 2017, Cryptogr..

[7]  Tong Li,et al.  Lightweight Cryptographic Techniques for Automotive Cybersecurity , 2018, Wirel. Commun. Mob. Comput..

[8]  Sangjin Lee,et al.  A Chosen Plaintext Linear Attack on Block Cipher CIKS-1 , 2002, ICICS.

[9]  Nguyen Hieu Minh,et al.  KT-64: A New Block Cipher Suitable to Efficient FPGA Implementation , 2010 .

[10]  Christian Rechberger,et al.  New Rigorous Analysis of Truncated Differentials for 5-round AES , 2018, IACR Cryptol. ePrint Arch..

[11]  N.H. Minh,et al.  Design and estimate of a new fast block cipher for wireless communication devices , 2008, 2008 International Conference on Advanced Technologies for Communications.

[12]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[13]  N. Sklavos,et al.  Minimum size primitives for efficient VLSI implementation of DDO-based ciphers , 2004, Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference (IEEE Cat. No.04CH37521).

[14]  Nikolay A. Moldovyan,et al.  New Class of Cryptographic Primitives and Cipher Design for Networks Security , 2006, Int. J. Netw. Secur..

[15]  Bac Do Thi,et al.  High-Speed Block Cipher Algorithm Based on Hybrid Method , 2014 .

[16]  Seokhie Hong,et al.  Distinguishing attack on SDDO-based block cipher BMD-128 , 2014 .

[17]  Seokhie Hong,et al.  Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1 , 2004, ACISP.

[18]  Changhoon Lee,et al.  Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets , 2018, Symmetry.

[19]  Nguyen Hieu Minh,et al.  New SDDO-Based Block Cipher for Wireless Sensor Network Security , 2010 .

[20]  Bac Do Thi,et al.  An Effective and Secure Cipher Based on SDDO , 2012 .

[21]  Seokhie Hong,et al.  Linear Cryptanalysis of SPECTR-H64 with Higher Order Differential Property , 2003, MMM-ACNS.

[23]  Jie Wu Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks , 2005 .

[24]  Nikolay A. Moldovyan,et al.  Fast Encryption Algorithm Spectr-H64 , 2001, MMM-ACNS.

[25]  K. M. S. Soyjaudah,et al.  Analytical Comparison of Cryptographic Techniques for Resource-constrained Wireless Security , 2009, Int. J. Netw. Secur..

[26]  Ashok M. Sapkal,et al.  An efficient AES implementation using FPGA with enhanced security features , 2020 .

[27]  Jinkeon Kang,et al.  Related-Key Attack on the MD-64 Block Cipher Suitable for Pervasive Computing Environments , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[28]  Nikolay A. Moldovyan,et al.  A cipher based on data-dependent permutations , 2001, Journal of Cryptology.

[29]  Nikolay A. Moldovyan On Cipher Design Based on Switchable Controlled Operations , 2003, Int. J. Netw. Secur..

[30]  Bac Do Thi,et al.  A High Speed Block Cipher Algorithm , 2013 .