HARPOCRATES: An Approach Towards Efficient Encryption of Data-at-Rest

被引:0
|
作者
Ali, Md Rasid [1 ]
Pal, Debranjan [1 ]
Das, Abhijit [1 ]
Chowdhury, Dipanwita Roy [1 ]
机构
[1] Indian Inst Technol Kharagpur, Dept Comp Sci Engn, Kharagpur 721302, West Bengal, India
关键词
Ciphers; Table lookup; Encryption; Matrices; Hardware; Convolution; Software algorithms; Block cipher; cryptanalysis; data-at-rest; diffusion; substitution convolution network; lookup table;
D O I
10.1109/TETC.2024.3387558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a new block cipher called HARPOCRATES, which is different from traditional SPN, Feistel, or ARX designs. The new design structure that we use is called the substitution convolution network. The novelty of the approach lies in that the substitution function does not use fixed S-boxes. Instead, it uses a key-driven lookup table storing a permutation of all 8-bit values. If the lookup table is sufficiently randomly shuffled, the round sub-operations achieve good confusion and diffusion to the cipher. While designing the cipher, the security, cost, and performances are balanced, keeping the requirements of encryption of data-at-rest in mind. The round sub-operations are massively parallelizable and designed such that a single active bit may make the entire state (an $8 \times 16$8x16 binary matrix) active in one round. We analyze the security of the cipher against linear, differential, and impossible differential cryptanalysis. The cipher's resistance against many other attacks like algebraic attacks, structural attacks, and weak keys are also shown. We implemented the cipher in software and hardware; found that the software implementation of the cipher results in better throughput than many well-known ciphers. Although HARPOCRATES is appropriate for the encryption of data-at-rest, it is also well-suited in data-in-transit environments.
引用
收藏
页码:173 / 184
页数:12
相关论文
共 50 条
  • [41] Towards Efficient Cryptographic Data Validation Service in Edge Computing
    Xu, Lei
    Yuan, Xingliang
    Zhou, Zhengxiang
    Wang, Cong
    Xu, Chungen
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (01) : 656 - 669
  • [42] Conglomerate Energy Efficient Elgamal Encryption Based Data Aggregation Cryptosystems in Wireless Sensor Network
    Babu T.G.
    Jayalakshmi V.
    International Journal of Engineering, Transactions A: Basics, 2022, 35 (02): : 417 - 424
  • [43] An Efficient & Secure Encryption Scheme for Biometric Data Using Holmes Map & Singular Value Decomposition
    Mehta, Garima
    Dutta, Malay Kishore
    Kim, Pyung Soo
    2014 INTERNATIONAL CONFERENCE ON MEDICAL IMAGING, M-HEALTH & EMERGING COMMUNICATION SYSTEMS (MEDCOM), 2015, : 211 - 215
  • [44] Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT
    Zhang, Qingyang
    Fu, Yujie
    Cui, Jie
    He, Debiao
    Zhong, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5797 - 5809
  • [45] Design of High Speed AES System for Efficient Data Encryption and Decryption System using FPGA
    Kumar, Santhosh R.
    Shashidhar, R.
    Mahalingaswamy, A. M.
    Kumar, Praveen M. S.
    Roopa, M.
    2018 3RD INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, COMMUNICATION, COMPUTER, AND OPTIMIZATION TECHNIQUES (ICEECCOT - 2018), 2018, : 1279 - 1282
  • [46] A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context
    Wang, Kun
    Yu, Jiahui
    Liu, Xiulong
    Guo, Song
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 657 - 667
  • [47] An efficient data transmission approach using IAES-BE
    Reddy, M. Indrasena
    Kumar, A. P. Siva
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 1633 - 1645
  • [48] An efficient data transmission approach using IAES-BE
    M. Indrasena Reddy
    A. P. Siva Kumar
    Cluster Computing, 2020, 23 : 1633 - 1645
  • [49] Towards Efficient Verifiable Boolean Search Over Encrypted Cloud Data
    Li, Feng
    Ma, Jianfeng
    Miao, Yinbin
    Liu, Zhiquan
    Choo, Kim-Kwang Raymond
    Liu, Ximeng
    Deng, Robert H.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 839 - 853
  • [50] Multidata-Owner Searchable Encryption Scheme Over Medical Cloud Data With Efficient Access Control
    Abdelfattah, Sherif
    Baza, Mohamed
    Mahmoud, Mohamed M. E. A.
    Fouda, Mostafa M.
    Abualsaud, Khalid A.
    Guizani, Mohsen
    IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 5067 - 5078