HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest

被引:0
|
作者
Ali, Md Rasid [1 ]
Pal, Debranjan [1 ]
Das, Abhijit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci Engn, Kharagpur 721302, West Bengal, India
关键词
Ciphers; Table lookup; Encryption; Matrices; Hardware; Convolution; Software algorithms; Block cipher; cryptanalysis; data-at-rest; diffusion; substitution convolution network; lookup table;
D O I
10.1109/TETC.2024.3387558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new block cipher called HARPOCRATES, which is different from traditional SPN, Feistel, or ARX designs. The new design structure that we use is called the substitution convolution network. The novelty of the approach lies in that the substitution function does not use fixed S-boxes. Instead, it uses a key-driven lookup table storing a permutation of all 8-bit values. If the lookup table is sufficiently randomly shuffled, the round sub-operations achieve good confusion and diffusion to the cipher. While designing the cipher, the security, cost, and performances are balanced, keeping the requirements of encryption of data-at-rest in mind. The round sub-operations are massively parallelizable and designed such that a single active bit may make the entire state (an $8 \times 16$8x16 binary matrix) active in one round. We analyze the security of the cipher against linear, differential, and impossible differential cryptanalysis. The cipher's resistance against many other attacks like algebraic attacks, structural attacks, and weak keys are also shown. We implemented the cipher in software and hardware; found that the software implementation of the cipher results in better throughput than many well-known ciphers. Although HARPOCRATES is appropriate for the encryption of data-at-rest, it is also well-suited in data-in-transit environments.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 50 条
  • [21] A genetic algorithm approach for breaking of bimplified data encryption standard
    Department of Computer Science, University of Jordan, Jordan
    不详
    Int. J. Secur. Appl., 9 (295-304): : 295 - 304
  • [22] A multithreaded programming approach for multimedia big data: encryption system
    Shadi Aljawarneh
    Muneer Bani Yassein
    We’am Adel Talafha
    Multimedia Tools and Applications, 2018, 77 : 10997 - 11016
  • [23] Enhancing Healthcare Data Security Using Quantum Cryptography for Efficient and Robust Encryption
    Basha, C. Bagath
    Murugan, K.
    Suresh, T.
    SrirengaNachiyar, V.
    Athimoolam, S.
    Pappa, C. Kanmani
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (05) : 1993 - 2000
  • [24] Efficient Random Key based Encryption System for Data Packet Confidentiality in WSNs
    Saleem, Kashif
    Khalil, Mohammed Sayim
    Fisal, Norsheila
    Ahmed, Adel Ali
    Orgun, Mehmet A.
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1662 - 1668
  • [25] An Efficient OFDM-Based Encryption Scheme Using a Dynamic Key Approach
    Melki, Reem
    Noura, Hassan N.
    Mansour, Mohammad M.
    Chehab, Ali
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01): : 361 - 378
  • [26] Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences
    Akiwate, Bahubali
    Parthiban, Latha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [27] A Novel Data Encryption Approach in the Grid-Structured Binary Image
    Barik, Ram Ch
    Sahu, Sitanshu S.
    Bhoi, Subhendu P.
    Changder, Suvamoy
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMPUTING & COMMUNICATION SYSTEMS, MCCS 2015, 2018, 453 : 103 - 115
  • [28] An efficient image encryption scheme using gray code based permutation approach
    Chen, Jun-xin
    Zhu, Zhi-liang
    Fu, Chong
    Yu, Hai
    Zhang, Li-bo
    OPTICS AND LASERS IN ENGINEERING, 2015, 67 : 191 - 204
  • [29] Efficient Key-Gate Placement and Dynamic Scan Obfuscation Towards Robust Logic Encryption
    Karmakar, Rajit
    Kumar, Harshit
    Chattopadhyay, Santanu
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 2109 - 2124
  • [30] An Approach Towards Image Encryption and Decryption using Quaternary Fractional-Linear Operations
    Kovalchuk, Anatoliy
    Izonin, Ivan
    Gregushml, Mihal
    Lotoshynska, Natalia
    10TH INT CONF ON EMERGING UBIQUITOUS SYST AND PERVAS NETWORKS (EUSPN-2019) / THE 9TH INT CONF ON CURRENT AND FUTURE TRENDS OF INFORMAT AND COMMUN TECHNOLOGIES IN HEALTHCARE (ICTH-2019) / AFFILIATED WORKOPS, 2019, 160 : 491 - 496