Browse > Article
http://dx.doi.org/10.13089/JKIISC.2020.30.3.349

Development and Security Analysis of GIFT-64-Variant That Can Be Efficiently Implemented by Bit-Slice Technique  

Baek, Seungjun (Kookmin University)
Kim, Hangi (Kookmin University)
Kim, Jongsung (Kookmin University)
Abstract
GIFT is a PRESENT-like cryptographic algorithm proposed in CHES 2017 and used S-box that can be implemented through a bit-slice technique[1]. Since bit-permutation is used as a linear layer, it can be efficiently implemented in hardware, but bit-slice implementation in software requires a specific conversion process, which is costly. In this paper, we propose a new bit-permutation that enables efficient bit-slice implementation and GIFT-64-variant using it. GIFT-64-variant has better safety than the existing GIFT in terms of differential and linear cryptanalysis.
Keywords
GIFT; Block cipher; Bit-slice; Bit-permutation; MILP; Active S-box;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim and Yosuke Todo, "GIFT: A Small Present Towards Reaching the Limit of Lightweight Encryption," CHES'17, LNCS 10529, pp. 321-345, Sep. 2017.
2 Eli Biham, "A Fast New DES Implementation in Software," FSE'97, LNCS 1267, pp. 260-272, Jan. 1997.
3 Mitsuru Matsui and Junko Nakajima, "On the Power of Bitslice Implementation on intel Core2 Processor," CHES'07, LNCS 4727, pp. 121-134, Sep. 2007.
4 Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, and Kerem Varici, "LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations," FSE'14, LNCS 8540, pp. 18-37, Mar. 2014.
5 Nicky Mouha, Qingju Wang, Dawu Gu and Bart Preneel, "Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming," Inscrypt'11, LNCS 7537, pp. 57-76, Dec. 2011.
6 WenTao Zhang, ZhenZhen Bao, DongDai Lin, Vincent Rijmen, Bohan Yang and Ingrid Verbauwhede, "RECTANGLE: A Bit-lice Lightweight Block Cipher Suitable for Multiple Platforms," Science China Information Sciences 58(12), pp. 1-15, Nov. 2015.
7 Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar and Tolga Yalcin, "Block Ciphers - Focus On The Linear Layer(fear. PRIDE)," CRYPTO'14, LNCS 8616, pp. 57-76, Aug. 2014.
8 Adnan Baysal and Sühap Sahin, "RoadRunnerL: A Small And Fast Bitslice Block Cipher For Low Cost 8-bit Processors," LightSec'15, LNCS 9542, pp. 58-76, Sep. 2015.
9 Siwei Sun, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song, "Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers," ASIACRYPT'14, LNCS 8873, pp. 158-178, Dec. 2014.
10 CPLEX, IMB, https://www.ibm.com/kr-ko/analytics/cplex-optimizer, Visited on Feb 3. 2020.
11 System for Algebra and Geometry Experimentation, Stein A. William, https://www.sagemath.org/, Visited on Feb 4. 2020.
12 gift-cipher, israelqwe, https://github.com/israelqwe/gift-cipher, Visited on March 8. 2020.