HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest

被引:0
|
作者
Ali, Md Rasid [1 ]
Pal, Debranjan [1 ]
Das, Abhijit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci Engn, Kharagpur 721302, West Bengal, India
关键词
Ciphers; Table lookup; Encryption; Matrices; Hardware; Convolution; Software algorithms; Block cipher; cryptanalysis; data-at-rest; diffusion; substitution convolution network; lookup table;
D O I
10.1109/TETC.2024.3387558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new block cipher called HARPOCRATES, which is different from traditional SPN, Feistel, or ARX designs. The new design structure that we use is called the substitution convolution network. The novelty of the approach lies in that the substitution function does not use fixed S-boxes. Instead, it uses a key-driven lookup table storing a permutation of all 8-bit values. If the lookup table is sufficiently randomly shuffled, the round sub-operations achieve good confusion and diffusion to the cipher. While designing the cipher, the security, cost, and performances are balanced, keeping the requirements of encryption of data-at-rest in mind. The round sub-operations are massively parallelizable and designed such that a single active bit may make the entire state (an $8 \times 16$8x16 binary matrix) active in one round. We analyze the security of the cipher against linear, differential, and impossible differential cryptanalysis. The cipher's resistance against many other attacks like algebraic attacks, structural attacks, and weak keys are also shown. We implemented the cipher in software and hardware; found that the software implementation of the cipher results in better throughput than many well-known ciphers. Although HARPOCRATES is appropriate for the encryption of data-at-rest, it is also well-suited in data-in-transit environments.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 50 条
  • [1] Data-at-Rest Security for Spark
    Shah, Syed Yousaf
    Paulovicks, Brent
    Zerfos, Petros
    2016 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2016, : 1464 - 1473
  • [2] An Approach for Efficient and Secure Data Encryption Scheme for Spatial Data
    Reddy N.C.S.
    Madhuravani B.
    Sneha D.P.
    SN Computer Science, 2020, 1 (3)
  • [3] An Efficient Approach for Increasing Security to Symmetric Data Encryption
    Islam, Muhammad Nazrul
    Mia, Md. Monir Hossain
    Islam, Md. Foizul
    Matin, M. A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (04): : 16 - 20
  • [4] A hybrid encryption approach for efficient and secure data transmission in IoT devices
    Zhang, Limin
    Wang, Li
    Journal of Engineering and Applied Science, 2024, 71 (01):
  • [5] A New Approach towards Encryption Schemes: Byte - Rotation Encryption Algorithm
    Bhati, Sunita
    Bhati, Anita
    Sharma, S. K.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2012, VOL II, 2012, : 979 - 982
  • [6] Towards Secure and Efficient "white-box" Encryption
    Khachatrian, Gurgen
    Abrahamyan, Sergey
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2019, 25 (08) : 868 - 886
  • [7] An Efficient Scheme of Authenticated Encryption with Associated Data
    Zhang, Shaolan
    Xing, Guobo
    Yang, Yixian
    2010 CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-5, 2010, : 4217 - +
  • [8] An Efficient Hybrid Approach of Attribute Based Encryption For Privacy Preserving Through Horizontally Partitioned Data
    Vashi, Devendrasinh
    Bhadka, H. B.
    Patel, Kuntal
    Garg, Sanjay
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 : 2437 - 2444
  • [9] Towards secure and communication-efficient broadcast encryption systems
    Zhu, Wen Tao
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (01) : 178 - 186
  • [10] Enhanced image encryption using AES algorithm with CBC mode: a secure and efficient approach
    Kevin Haria
    Riya Shah
    Vanshita Jain
    Ramchandra Mangrulkar
    Iran Journal of Computer Science, 2024, 7 (3) : 589 - 605