HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest

被引:0
|
作者
Ali, Md Rasid [1 ]
Pal, Debranjan [1 ]
Das, Abhijit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci Engn, Kharagpur 721302, West Bengal, India
关键词
Ciphers; Table lookup; Encryption; Matrices; Hardware; Convolution; Software algorithms; Block cipher; cryptanalysis; data-at-rest; diffusion; substitution convolution network; lookup table;
D O I
10.1109/TETC.2024.3387558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new block cipher called HARPOCRATES, which is different from traditional SPN, Feistel, or ARX designs. The new design structure that we use is called the substitution convolution network. The novelty of the approach lies in that the substitution function does not use fixed S-boxes. Instead, it uses a key-driven lookup table storing a permutation of all 8-bit values. If the lookup table is sufficiently randomly shuffled, the round sub-operations achieve good confusion and diffusion to the cipher. While designing the cipher, the security, cost, and performances are balanced, keeping the requirements of encryption of data-at-rest in mind. The round sub-operations are massively parallelizable and designed such that a single active bit may make the entire state (an $8 \times 16$8x16 binary matrix) active in one round. We analyze the security of the cipher against linear, differential, and impossible differential cryptanalysis. The cipher's resistance against many other attacks like algebraic attacks, structural attacks, and weak keys are also shown. We implemented the cipher in software and hardware; found that the software implementation of the cipher results in better throughput than many well-known ciphers. Although HARPOCRATES is appropriate for the encryption of data-at-rest, it is also well-suited in data-in-transit environments.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 50 条
  • [31] A Structured Approach Towards Big Data Identification
    Ahmed, Hameeza
    Ismail, Muhammad Ali
    IEEE TRANSACTIONS ON BIG DATA, 2023, 9 (01) : 147 - 159
  • [32] Efficient In-Memory AES Encryption Implementation Using a General Memristive Logic: Surmounting the Data Movement Bottleneck.
    Ma, Mingyuan
    Zhu, Yu
    Zhu, Zhenhua
    Yuan, Rui
    Liu, Jialong
    Xu, Liying
    Yang, Yuchao
    Wang, Yu
    IEEE NANOTECHNOLOGY MAGAZINE, 2022, 16 (02) : 24 - 38
  • [33] An efficient framework for big data security based on selection encryption on AmazonEC2
    Sakr, Ahmed S.
    Abdullkader, Hatem M.
    El-kafrawy, P. M.
    Ibrahem, Hani M.
    2018 1ST INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS' 2018), 2018,
  • [34] A new rapid hyperchaotic system for more efficient 2D data encryption
    Bouslehi, Hamdi
    Seddik, Hassene
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (06) : 7741 - 7762
  • [35] A new rapid hyperchaotic system for more efficient 2D data encryption
    Hamdi Bouslehi
    Hassene Seddik
    Multimedia Tools and Applications, 2018, 77 : 7741 - 7762
  • [36] An enhanced approach to improve the encryption of big data using intelligent classification technique
    Gitanjali Gupta
    Kamlesh Lakhwani
    Multimedia Tools and Applications, 2022, 81 : 25171 - 25204
  • [37] A New Approach for Enhancing AES-Based Data Encryption Using ECC
    Sherali, Fairouz
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2024, 19 (01) : 229 - 235
  • [38] An enhanced approach to improve the encryption of big data using intelligent classification technique
    Gupta, Gitanjali
    Lakhwani, Kamlesh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (18) : 25171 - 25204
  • [39] A Novel Scrambled Data Hiding Approach Towards Securing Sensitive Data
    Amma, Bhuvaneswari N. G.
    Kapoor, Jitaksh
    IETE JOURNAL OF RESEARCH, 2023, 69 (09) : 5847 - 5856
  • [40] Towards the AlexNet Moment for Homomorphic Encryption: HCNN, the First Homomorphic CNN on Encrypted Data With GPUs
    Al Badawi, Ahmad
    Jin, Chao
    Lin, Jie
    Mun, Chan Fook
    Jie, Sim Jun
    Tan, Benjamin Hong Meng
    Nan, Xiao
    Aung, Khin Mi Mi
    Chandrasekhar, Vijay Ramaseshan
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (03) : 1330 - 1343