Advertisement

HDNM8: A Round-8 High Diffusion Block Cipher with Nonlinear Mixing Function

  • Jaydeb BhaumikEmail author
  • Dipanwita Roy Chowdhury
Conference paper
Part of the Springer Proceedings in Mathematics & Statistics book series (PROMS, volume 91)

Abstract

Since \(2001\), AES-\(128\) is accepted as the standard block cipher. Till date, full-round AES is secure against all existing attacks, but reduced-round versions are susceptible to several attacks. In this paper, diffusion of AES-like block cipher is improved by incorporating a \(128\)-bit diffusion layer based on a maximum distance separable code. Moreover, a nonlinear vectorial Boolean function is employed for round key mixing, which improves the nonlinearity. Employing this high diffusion and improved nonlinearity, a new block cipher called ‘HDNM8’ is proposed. It is shown that HDNM8 is secure against several existing cryptographic attacks. HDNM8 has been implemented on an FPGA platform. It has been found that it requires reasonable hardware and provides an acceptable throughput.

References

  1. 1.
    Barreto, P., Rijmen, V.: The Anubis block cipher. Submission to the NESSIE Project (2000a)Google Scholar
  2. 2.
    Barreto, P., Rijmen, V.: The Khazad legacy-level block cipher. Submission to the NESSIE Project (2000b)Google Scholar
  3. 3.
    Bhaumik, J., Roy Chowdhury, D.: Nmix: an ideal candidate for key mixing. In: Proceedings International Conference on Security and Cryptography, Italy, pp. 285–288 (2009)Google Scholar
  4. 4.
    Bhaumik, J., Roy Chowdhury, D.: CA-based diffusion layer for an SPN-type block cipher. In: Proceedings of the 17th International Workshop on Cellular Automata and Discrete Complex Systems Chile, pp. 243–251 (2011)Google Scholar
  5. 5.
    Biryukov, A.: Analysis of involutional ciphers Khazad and Anubis. In: Proceedings of the Fast Software Encryption, Sweden. LNCS, vol. 2887, pp. 45–53 (2003)Google Scholar
  6. 6.
    Biryukov, A.: The design of stream cipher LEX. In: Proceedings of the Selected areas in cryptography. Canada. LNCS, vol. 4356, pp. 67–75 (2007)Google Scholar
  7. 7.
    Canright, D.: A very compact S-box for AES. In: Prcoceedings of Cryptographic Hardware and Embedded Systems. UK. LNCS, vol. 3659, pp. 441–455 (2005)Google Scholar
  8. 8.
    Courtois, N.T., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: Proceedings of the ASIACRYPT, New Zealand. LNCS, vol. 2501, pp. 267–287 (2002)Google Scholar
  9. 9.
    Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral Dissertation, K. U. Leuven (1995)Google Scholar
  10. 10.
    Daemen, J., Rijmen, V.: The Design of Rijndael-AES: The Advanced Encryption Standard. Springer, New York (2002)CrossRefGoogle Scholar
  11. 11.
    Daemen, J., Rijmen, V.: The Pelican MAC function. In: Cryptology ePrint Archive. Report 2005/008. http://eprint.iacr.org/
  12. 12.
    Daemen, J., Lamberger, M., Pramstaller, N., Rijmen, V., Vercauteren, F.: Computatioal aspects of the expected differential probability of a 4-round AES and AES-like ciphers. J. Comput. 85(1–2), 85–104 (2009)CrossRefzbMATHMathSciNetGoogle Scholar
  13. 13.
    Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., Cho, I.: Provable security against differential and linear cryptanalysis for the SPN structure. In: Proceedings of the Fast Software Encryption. LNCS, vol. 1978, pp. 273–283 (2000)Google Scholar
  14. 14.
    Junod, P., Vaudenay, S.: Perfect diffusion primitives for block ciphers building efficient MDS matrices. In: Proceedings of the Selected Areas in Cryptography. LNCS, vol. 3357, pp. 84–99 (2004)Google Scholar
  15. 15.
    Koo, B.W., Jang, H.S. Song, J.H.: Constructing and cryptanalysis of a \(16 \times 16\) binary matrix as a diffusion layer. In: Proceedings of the WISA. LNCS, vol. 2908, pp. 489–503 (2003)Google Scholar
  16. 16.
    Koo, B.W., Jang, H.S. Song, J.H.: On constructing of a \(32 \times 32\) binary matrix as a diffusion layer for a \(256\)-bit block cipher. In: Proceedings of the International Conference on Information Security and Cryptology. LNCS, vol. 4296, pp. 51–64 (2006)Google Scholar
  17. 17.
    Minematsu, K., Tsunoo, Y.: Provable secure MACs from differentially-unifrom permutations and AES-based implementations. In: Proceedings of the Fast Software Encryption, Austria. LNCS, vol. 4047, pp. 226–241 (2006)Google Scholar
  18. 18.
    Nakahara Jr, J., Abrahao, E.: A New involutory MDS matrix for the AES. Int. J. Netw. Secur. 9(2), 109–116 (2009)Google Scholar
  19. 19.
    Preneel, B., Bosselaers, A., Rijmen, V., Van Rompay, B., Granboulan, L., Stern, J., Murphy, S., Dichtl, M., Serf, P., Biham, E., Dunkelman, O., Furman, V., Koeune, F., Piret, G., Quisquater, J-J., Knudsen, L., Raddum, H.: Comments by the NESSIE Project on the AES Finalists (2000)Google Scholar
  20. 20.
    Rijmen, V., Daemen, J., Preneel, B., Bosselaers, A., De Win, E.: The cipher SHARK. In: Proceedings of the Fast Software Encryption. LNCS, vol. 1039, pp. 99–111 (1996)Google Scholar

Copyright information

© Springer India 2014

Authors and Affiliations

  1. 1.Haldia Institute of TechnologyHaldiaIndia
  2. 2.Indian Institute of Technology KharagpurKharagpurIndia

Personalised recommendations