Advertisement

PRINTcipher: A Block Cipher for IC-Printing

  • Lars Knudsen
  • Gregor Leander
  • Axel Poschmann
  • Matthew J. B. Robshaw
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6225)

Abstract

In this paper we consider some cryptographic implications of integrated circuit (IC) printing. While still in its infancy, IC-printing allows the production and personalisation of circuits at very low cost. In this paper we present two block ciphers PRINTcipher-48 and PRINTcipher-96 that are designed to exploit the properties of IC-printing technology and we further extend recent advances in lightweight block cipher design.

Keywords

symmetric cryptography block cipher IC-printing hardware implementation 

References

  1. 1.
    Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: Present - An Ultra-Lightweight Block Cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  2. 2.
    de Cannière, C., Dunkelman, O., Knezević, M.: KATAN and KTANTAN–A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  3. 3.
    Collard, B., Standaert, F.-X.: A Statistical Saturation Attack against the Block Cipher PRESENT. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 195–211. Springer, Heidelberg (2009)Google Scholar
  4. 4.
    Daemen, J., Govaerts, R., Vandewalle, J.: A new approach to block cipher design. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 18–32. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    EPCglobal. Organisation information, http://www.epcglobal.com
  6. 6.
    Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. IEE Proceedings of Information Security 152(1), 13–20 (2005)CrossRefGoogle Scholar
  7. 7.
    Fišer, P., Hlavička, J.: BOOM - A Heuristic Boolean Minimizer. Computers and Informatics 22(1), 19–51 (2003)zbMATHGoogle Scholar
  8. 8.
    Fišer, P., Hlavička, J.: Two-Level Boolean Minimizer BOOM-II. In: Proceedings of 6th Int. Workshop on Boolean Problems – IWSBP’04, pp. 221–228 (2004)Google Scholar
  9. 9.
    Good, T., Benaissa, M.: Hardware Results for Selected Stream Cipher Candidates. In: State of the Art of Stream Ciphers (SASC 2007), Workshop Record (February 2007), www.ecrypt.eu.org/stream
  10. 10.
    GOST. Gosudarstvennyi standard 28147-89, cryptographic protection for data processing systems. Government Committee of the USSR for Standards (1989) (in Russian)Google Scholar
  11. 11.
    Hämäläinen, P., Alho, T., Hännikäinen, M., Hämäläinen, T.D.: Design and Implementation of Low-Area and Low-Power AES Encryption Hardware Core. In: DSD, pp. 577–583 (2006)Google Scholar
  12. 12.
    Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  13. 13.
    Kovio. Company information available via, http://www.kovio.com
  14. 14.
    Lai, X., Massey, J., Murphy, S.: Markov ciphers and differential cryptanalysis. In: Davies, D. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 17–38. Springer, Heidelberg (1991)Google Scholar
  15. 15.
    Leander, G., Paar, C., Poschmann, A., Schramm, K.: New Lightweight DES Variants. In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 196–210. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  16. 16.
    Lim, C., Korkishko, T.: mCrypton - A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors. In: Song, J., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243–258. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  17. 17.
    Mace, F., Standaert, F.-X., Quisquater, J.-J.: ASIC Implementations of the Block Cipher SEA for Constrained Applications. In: RFID Security — RFIDsec 2007, Workshop Record, Malaga, Spain, pp. 103–114 (2007)Google Scholar
  18. 18.
    Matsui, M.: New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. In: Gollmann, D. (ed.) FSE 1996. LNCS, vol. 1039, pp. 205–218. Springer, Heidelberg (1996)Google Scholar
  19. 19.
    PolyIC. Information available via, http://www.polyIC.com
  20. 20.
    Poschmann, A., Robshaw, M.J.B., Vater, F., Paar, C.: Lightweight Cryptography and RFID: Tackling the Hidden Overheads. In: Lee, D., Hong, S. (eds.) Proceedings of ICISC ’09. Springer, Heidelberg (to appear, 2009)Google Scholar
  21. 21.
    Robshaw, M.J.B.: Searching for Compact Algorithms: cgen. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 37–49. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  22. 22.
    Rolfes, C., Poschmann, A., Leander, G., Paar, C.: Ultra-Lightweight Implementations for Smart Devices - Security for 1000 Gate Equivalents. In: Grimaud, G., Standaert, F.-X. (eds.) CARDIS 2008. LNCS, vol. 5189, pp. 89–103. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  23. 23.
    Samyde, D., Skorobogatov, S., Anderson, R., Quisquater, J.: On a New Way to Read Data from Memory. In: SISW ’02: Proceedings of the First International IEEE Security in Storage Workshop, pp. 65–69. IEEE Computer Society, Los Alamitos (2002)Google Scholar
  24. 24.
    Schneier, B.: Description of a new variable-length key, 64-bit block cipher (Blowfish). In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 191–204. Springer, Heidelberg (1994)Google Scholar
  25. 25.
    Schneier, B., Kelsey, J., Whiting, D., Wagner, D., Hall, Ferguson., N.: Twofish: A 128-bit block cipher. Submitted as candidate for AES, www.nist.gov/aes
  26. 26.
    Standaert, F.-X., Piret, G., Gershenfeld, N., Quisquater, J.-J.: SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 222–236. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  27. 27.
    Synopsys. Design Compiler User Guide - Version A-2007.12 (December 2007), http://tinyurl.com/pon88o
  28. 28.
    Synopsys. Power Compiler User Guide - Version A-2007.12 (March 2007), http://tinyurl.com/lfqhy5
  29. 29.
    Virtual Silicon Inc. 0.18 μm VIP Standard Cell Library Tape Out Ready, Part Number: UMCL18G212T3, Process: UMC Logic 0.18 μm Generic II Technology: 0.18μm (July 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Lars Knudsen
    • 1
  • Gregor Leander
    • 1
  • Axel Poschmann
    • 2
  • Matthew J. B. Robshaw
    • 3
  1. 1.Technical University DenmarkLyngbyDenmark
  2. 2.School of Physical and Mathematical SciencesNanyang Technological UniversitySingapore
  3. 3.Orange LabsIssy les MoulineauxFrance

Personalised recommendations