Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions

被引:13
作者
Sajadieh, Mahdi [1 ]
Dakhilalian, Mohammad [2 ]
Mala, Hamid [3 ]
Sepehrdad, Pouyan [4 ]
机构
[1] Islamic Azad Univ, Khorasgan Isfahan Branch, Dept Elect Engn, Esfahan, Iran
[2] Isfahan Univ Technol, Dept Elect & Comp Engn, Esfahan, Iran
[3] Univ Isfahan, Dept Informat Technol Engn, Esfahan, Iran
[4] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
关键词
Block ciphers; Diffusion layer; Branch number; MDS matrix;
D O I
10.1007/s00145-013-9163-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Many modern block ciphers use maximum distance separable (MDS) matrices as the main part of their diffusion layers. In this paper, we propose a very efficient new class of diffusion layers constructed from several rounds of Feistel-like structures whose round functions are linear. We investigate the requirements of the underlying linear functions to achieve the maximal branch number for the proposed 4x4 words diffusion layer, which is an indication of the highest level of security with respect to linear and differential attacks. We try to extend our results for up to 8x8 words diffusion layers. The proposed diffusion layers only require simple operations such as word-level XORs, rotations, and they have simple inverses. They can replace the diffusion layer of several block ciphers and hash functions in the literature to increase their security, and performance. Furthermore, it can be deployed in the design of new efficient lightweight block ciphers and hash functions in future.
引用
收藏
页码:240 / 256
页数:17
相关论文
共 15 条
[1]  
[Anonymous], THESIS ELEKTROTECHNI
[2]  
Bernstein D.J., 2005, SALSA20 STREAM CIPHE
[3]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[4]  
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[5]   The PHOTON Family of Lightweight Hash Functions [J].
Guo, Jian ;
Peyrin, Thomas ;
Poschmann, Axel .
ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 :222-239
[6]  
Guo J, 2011, LECT NOTES COMPUT SC, V6917, P326, DOI 10.1007/978-3-642-23951-9_22
[7]  
Lin S., 2004, Error Control Coding
[8]  
Matsui M., 1993, Advances in Cryptology, V765, P386, DOI [DOI 10.1007/3-540-48285-7, 10.1007/3-540-48285-733, DOI 10.1007/3-540-48285-733]
[9]  
Ohkuma K., 2001, Selected Areas in Cryptography. 7th Annual International Workshop, SAC 2000. Proceedings (Lecture Notes in Computer Science Vol.2012), P72
[10]   Perfect involutory diffusion layers based on invertibility of some linear functions [J].
Sajadieh, M. ;
Dakhilalian, M. ;
Mala, H. .
IET INFORMATION SECURITY, 2011, 5 (04) :228-236