Insha Syed, Mir Nazish, Ishfaq Sultan, M. T. Banday
{"title":"GIFT分组密码的实现技术:实时性能比较","authors":"Insha Syed, Mir Nazish, Ishfaq Sultan, M. T. Banday","doi":"10.1109/STCR55312.2022.10009581","DOIUrl":null,"url":null,"abstract":"Lightweight cryptography is gaining popularity for securing private and sensitive data collected by smart IoT devices. It provides security solutions tailored for constrained devices with the low area, low power and low latency requirements. The PRESENT is one of the most popular block cyphers that are efficient in hardware and offer an optimum level of security. However, the PRESENT cypher does not provide much security against the linear cryptanalytic attack. These security concerns have been addressed through the design of the GIFT block cypher that makes an appropriate choice and efficient use of lighter s-box and bit-permutations, thereby making the overall design more secure and hardware efficient than the PRESENT block cypher. However, the realisation of the linear layer by the bit-permutation method makes the GIFT cypher inefficient in software. This paper describes the software-efficient lookup table, bit-slicing and fix-slicing implementation techniques for the GIFT block cypher. These techniques have been simulated in KEIL MDK IDE and implemented on the ARM Cortex-M3-based LPC1768 hardware platform. Performance comparison of these techniques has been carried out using ULINKpro and ULINKplus debug adapters in terms of various metrics such as power, energy, execution time and memory code size.","PeriodicalId":338691,"journal":{"name":"2022 Smart Technologies, Communication and Robotics (STCR)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Implementation Techniques for GIFT Block Cypher: A Real-Time Performance Comparison\",\"authors\":\"Insha Syed, Mir Nazish, Ishfaq Sultan, M. T. Banday\",\"doi\":\"10.1109/STCR55312.2022.10009581\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Lightweight cryptography is gaining popularity for securing private and sensitive data collected by smart IoT devices. It provides security solutions tailored for constrained devices with the low area, low power and low latency requirements. The PRESENT is one of the most popular block cyphers that are efficient in hardware and offer an optimum level of security. However, the PRESENT cypher does not provide much security against the linear cryptanalytic attack. These security concerns have been addressed through the design of the GIFT block cypher that makes an appropriate choice and efficient use of lighter s-box and bit-permutations, thereby making the overall design more secure and hardware efficient than the PRESENT block cypher. However, the realisation of the linear layer by the bit-permutation method makes the GIFT cypher inefficient in software. This paper describes the software-efficient lookup table, bit-slicing and fix-slicing implementation techniques for the GIFT block cypher. These techniques have been simulated in KEIL MDK IDE and implemented on the ARM Cortex-M3-based LPC1768 hardware platform. Performance comparison of these techniques has been carried out using ULINKpro and ULINKplus debug adapters in terms of various metrics such as power, energy, execution time and memory code size.\",\"PeriodicalId\":338691,\"journal\":{\"name\":\"2022 Smart Technologies, Communication and Robotics (STCR)\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 Smart Technologies, Communication and Robotics (STCR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/STCR55312.2022.10009581\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 Smart Technologies, Communication and Robotics (STCR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/STCR55312.2022.10009581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Implementation Techniques for GIFT Block Cypher: A Real-Time Performance Comparison
Lightweight cryptography is gaining popularity for securing private and sensitive data collected by smart IoT devices. It provides security solutions tailored for constrained devices with the low area, low power and low latency requirements. The PRESENT is one of the most popular block cyphers that are efficient in hardware and offer an optimum level of security. However, the PRESENT cypher does not provide much security against the linear cryptanalytic attack. These security concerns have been addressed through the design of the GIFT block cypher that makes an appropriate choice and efficient use of lighter s-box and bit-permutations, thereby making the overall design more secure and hardware efficient than the PRESENT block cypher. However, the realisation of the linear layer by the bit-permutation method makes the GIFT cypher inefficient in software. This paper describes the software-efficient lookup table, bit-slicing and fix-slicing implementation techniques for the GIFT block cypher. These techniques have been simulated in KEIL MDK IDE and implemented on the ARM Cortex-M3-based LPC1768 hardware platform. Performance comparison of these techniques has been carried out using ULINKpro and ULINKplus debug adapters in terms of various metrics such as power, energy, execution time and memory code size.