Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.

Similar presentations


Presentation on theme: "A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University."— Presentation transcript:

1 A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University. crypto77@cist.korea.ac.kr

2 Contents  Introduction  Background  Design Goals  Description of Block Cipher KB1  Security Analysis  Implementation Efficiency  Conclusion

3 Introduction (1/2)  Background  The ubiquitous computing paradigm is being watched with interest.  Typical ubiquitous computing devices impose new constraints in block cipher design due to their size and shape.  Tiny processors embedded in ubiquitous computing devices have a miniature battery  The chip area required hardware implementation of a block cipher should be small enough.  In this environments, it is required low-power, low- cost and light-weight block ciphers.

4 Introduction (2/2)  There are few known ciphers which are suitable to these environments.  In order to prepare new computing paradigm in advance, we must develop new block cipher which are suitable to these environments  The block cipher KB1 is designed with above new constraints in ubiquitous computing environments in mind.

5 Design Goals  To design a block cipher with extreme efficiency in resource usage and power consumption.  To come up with a block cipher optimized for resource-constrained applications.  use the parameters of 64-bit block length and 128-bit key length  To achieve low complexity in hardware while providing sufficient security.

6 Algorithm Specifications (1/9)  KB1  64-bit block with a 128-bit key size by iterating a round function 32 times.  Initial Transformation, Round Transformation, Final Transformation IT Round 1 Round 32 FT ……………….. Key Schedule

7 Algorithm Specifications (2/9)  Initial Transformation  The P i (i=0,2,4,6) bytes of plaintext are XORed (or added) with a part of the master key  |P i |=8 bits and |MK i |=8 bits X 0,7 X 0,6 X 0,5 X 0,4 X 0,3 X 0,2 X 0,1 X 0,0 P7P7 P6P6 P5P5 P4P4 P3P3 P2P2 P1P1 P0P0 MK 3 MK 2 MK 1 MK 0 Round 1

8 Algorithm Specifications (3/9)  Round Transformation  Non-linear operation “+” mod 2 8  eXclusive-OR operation  Diffusion functions F 0 and F 1  F 0 (X)=(X<<<1)^(X<<<2)^(X<<<7),  F 1 (X)=(X<<<3)^(X<<<4)^(X<<<6), where |X|=8 bits

9  The j-th input bytes X i,j (j=0,2,4,6) of i-th round are updated by the input of (i-1)-th round, the round keys, and F functions.  The remaining input bytes X i,j (j=1,3,5,7) of (i)-th round are transferred by the j-th input bytes X i-1,j (j=0,2,4,6) of (i-1)-th round, respectively. X i-1,7 X i-1,6 X i-1,5 X i-1,4 X i-1,3 X i-1,2 X i-1,1 X i-1,0 F0F0 F0F0 F1F1 F1F1 X i,7 X i,6 X i,5 X i,4 X i,3 X i,2 X i,1 X i,0 SK[4i- 4] SK[4i- 3] SK[4i- 2]SK[4i- 1] Algorithm Specifications (4/9)

10 Algorithm Specifications (5/9)  Final Transformation  The j-th output bytes (j=1,3,5,7) of the 32-th round, (X 32,j ), are XORed (or added) with a part of the master key. Round 32 X 32,7 X 32,6 X 32,5 X 32,4 X 32,3 X 32,2 X 32,1 X 32,0 MK 15 MK 14 MK 13 MK 12 C7C7 C6C6 C5C5 C4C4 C3C3 C2C2 C1C1 C0C0

11 Algorithm Specifications (6/9)  Key Schedule  Two steps : Generating whitening keys, Generating round keys  Step 1 : Generating whitening keys.  The first 4 bytes of 128-bit master key MK=(MK 0,…, MK 16 ), (MK 0, MK 1, MK 2, MK 3 ), are used as the initial whitening keys.  The last 4 bytes of 128-bit master key, (MK 12, MK 13, MK 14, MK 15 ), are used as the final whitening keys.

12 Algorithm Specifications (7/9)  Step 2 : Generating round keys 2i2i Permutation  g SK[2i]  2i+1 g SK[2i+1] i = 0,…,63 MK=MK 15 || … || MK 0 g g SK[2i] SK[2i+1] Permutation 

13 Algorithm Specifications (8/9)  “g” function : g(x,y,z,w)=((x+y) z)+  i   i : an internal state of LFSR h which is defined by the primitive polynomial x 7 +x 3 +1 over F 2 [x]  initial state  0 =(s 6, s 5, s 4, s 3, s 2, s 1, s 0 )=(1,0,1,1,0,1,0)  s i+6 =s i+2 s i-1   i =(s i+6, s i+5, s i+4, s i+3, s i+2, s i+1, s i ) SK[j] ii x y z

14 Algorithm Specifications (9/9)  “  ” : A bit-permutation which has 64 cycles.  [128] = { 62, 75, 72, 57, 94, 101, 108, 45, 18, 51, 46, 81, 36, 125, 122, 27, 42, 49, 26, 115, 0, 85, 58, 99, 88, 31, 106, 47, 40, 3, 14, 107, 76, 37, 56, 1, 98, 13, 110, 113, 8, 73, 120, 59, 52, 39, 30, 97, 68, 93, 92, 25, 80, 77, 6, 117, 86, 5, 10, 17, 38, 69, 112, 43, 24, 55, 4, 65, 124, 11, 84, 91, 20, 121, 70, 19, 118, 71, 100, 111, 96, 89, 74, 35, 48, 7, 32, 105, 102, 41, 50, 83, 34, 53, 60, 21, 114, 87, 126, 15, 12, 67, 78, 119, 66, 123, 2, 95, 28, 33, 82, 109, 22, 23, 64, 9, 104, 103, 44, 61, 54, 127, 116, 29, 90, 63, 16, 79};

15 Security Analysis  Strength against known attacks AttacksNumber of RoundsAttack Complexity Differential Cryptanalysis 13/322 62 CP, 2 122 times Linear Cryptanalysis 13/322 57 KP, 2 114.2 times Impossible D.C18/322 45 CP, 2 109 times Square Attack16/322 42 CP, 2 51 times Boomerang Attack 13/322 63 CP, 2 124.3 times  KB1 has sufficient resistances against known attacks

16 Implementation Efficiency  Hardware Effieciency  Efficiency in low-cost hardware implementation is one of main design objectives of KB1.  The following hardware implementation of KB1 means that it can be implemented using around 3K to 4K gates with high enough performances. Component Gate count 8-bit XOR17 8-bit +41 8-bit register36 LFSR49 F0,F140 g function629(533) Key scheduler2365(2269) Round function838 Control unit562 Total3795(3699)

17 Conclusion In this talk,  Presented a 64-bit block cipher KB1 which has been designed for use in resource-constrained environments, such as tiny ubiquitous devices.  Introduced its security and efficiency.  Our hardware implementation of KB1 shows that it can be implemented using around 3K to 4K gates.  So, KB1 are well-suited for our targeted applications, such as RFID, any power/space-limited applications.

18 Thank You !


Download ppt "A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University."

Similar presentations


Ads by Google