Design of Message Authentication Code with AES and. SHA-1 on FPGA

Similar documents
4. Design Principles of Block Ciphers and Differential Attacks

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Design of a High Throughput 128-bit AES (Rijndael Block Cipher)

TMA4155 Cryptography, Intro

Lightweight Mixcolumn Architecture for Advanced Encryption Standard

SOME OBSERVATIONS ON AES AND MINI AES. Hüseyin Demirci TÜBİTAK UEKAE

SIDE-CHANNEL attacks exploit the leaked physical information

DATA SECURITY USING ADVANCED ENCRYPTION STANDARD (AES) IN RECONFIGURABLE HARDWARE FOR SDR BASED WIRELESS SYSTEMS

Security Enhancement and Speed Monitoring of RSA Algorithm

Cryptography. Module in Autumn Term 2016 University of Birmingham. Lecturers: Mark D. Ryan and David Galindo

Symmetric-key encryption scheme based on the strong generating sets of permutation groups

Low power implementation of Trivium stream cipher

A SCALABLE ARCHITECTURE FOR VARIABLE BLOCK SIZE MOTION ESTIMATION ON FIELD-PROGRAMMABLE GATE ARRAYS. Theepan Moorthy and Andy Ye

Layout Consideration and Circuit Solution to Prevent EOS Failure Induced by Latchup Test in A High-Voltage Integrated Circuits

TESTABLE VLSI CIRCUIT DESIGN FOR CELLULAR ARRAYS

A FFT/IFFT Soft IP Generator for OFDM Communication System

Implementation and Performance Testing of the SQUASH RFID Authentication Protocol

Chapter 4 The Data Encryption Standard

CDMA Physical Layer Built-in Security Enhancement

Digital Systems Design

Multi Secret Sharing Scheme for Encrypting Two Secret Images into Two Shares

High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive

Design and Analysis of a Portable High-Speed Clock Generator

Block Ciphers Security of block ciphers. Symmetric Ciphers

AN APPROACH TO ONLINE ANONYMOUS ELECTRONIC CASH. Li Ying. A thesis submitted in partial fulfillment of the requirements for the degree of

USING EMBEDDED PROCESSORS IN HARDWARE MODELS OF ARTIFICIAL NEURAL NETWORKS

The number theory behind cryptography

A software solution for displacement and angular speed measurement through virtual instrumentation

DESIGN & IMPLEMENTATION OF FIXED WIDTH MODIFIED BOOTH MULTIPLIER

DUBLIN CITY UNIVERSITY

Abstract. 1 Introduction. 2 The Proposed Scheme. The 29th Workshop on Combinatorial Mathematics and Computation Theory

DUBLIN CITY UNIVERSITY

B. Substitution Ciphers, continued. 3. Polyalphabetic: Use multiple maps from the plaintext alphabet to the ciphertext alphabet.

Conditional Cube Attack on Reduced-Round Keccak Sponge Function

VLSI Design of a RSA Encryption/Decryption Chip using Systolic Array based Architecture

Proceedings of the 6th WSEAS International Conference on Multimedia Systems & Signal Processing, Hangzhou, China, April 16-18, 2006 (pp )

REFERENCES. [1] P. J. van Wijnen, H. R. Claessen, and E. A. Wolsheimer, A new straightforward

Cryptography s Application in Numbers Station

V.Sorge/E.Ritter, Handout 2

DYNAMICALLY RECONFIGURABLE SOFTWARE DEFINED RADIO FOR GNSS APPLICATIONS

AES Encryption and Decryption in Microsoft.NET

OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications

A GENERAL SYSTEM DESIGN & IMPLEMENTATION OF SOFTWARE DEFINED RADIO SYSTEM

Minimum key length for cryptographic security

A 3 8 GHz Broadband Low Power Mixer

Webpage: Volume 4, Issue VI, June 2016 ISSN

Respin by Pin-Block Design and Floorplanning for Package-Board Codesign

Some Cryptanalysis of the Block Cipher BCMPQ

On Permutation Operations in Cipher Design

CARRY SAVE COMMON MULTIPLICAND MONTGOMERY FOR RSA CRYPTOSYSTEM

Quality of Encryption Measurement of Bitmap Images with RC6, MRC6, and Rijndael Block Cipher Algorithms

Math 319 Problem Set #7 Solution 18 April 2002

ESD-Transient Detection Circuit with Equivalent Capacitance-Coupling Detection Mechanism and High Efficiency of Layout Area in a 65nm CMOS Technology

AREA AND DELAY EFFICIENT DESIGN FOR PARALLEL PREFIX FINITE FIELD MULTIPLIER

Security Note. BBM Enterprise

Synthesis and Analysis of 32-Bit RSA Algorithm Using VHDL

A Proposed Technique For Hiding Data Into Video Files

Hardware Implementation of BCH Error-Correcting Codes on a FPGA

SHA-3 and permutation-based cryptography

Copyright protection scheme for digital images using visual cryptography and sampling methods

WITH the rapid evolution of liquid crystal display (LCD)

A Novel Encryption System using Layered Cellular Automata

High Speed ECC Implementation on FPGA over GF(2 m )

Course Business. Harry. Hagrid. Homework 2 Due Now. Midterm is on March 1. Final Exam is Monday, May 1 (7 PM) Location: Right here

Secured Bank Authentication using Image Processing and Visual Cryptography

Enhance Image using Dynamic Histogram and Data Hiding Technique

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Learning Outcomes. Spiral 2 8. Digital Design Overview LAYOUT

Unlinkability and Redundancy in Anonymous Publication Systems

An Efficient Interception Mechanism Against Cheating In Visual Cryptography With Non Pixel Expansion Of Images

Number Theory and Public Key Cryptography Kathryn Sommers

Permutation Operations in Block Ciphers

Triple-DES Block of 96 Bits: An Application to. Colour Image Encryption

o Broken by using frequency analysis o XOR is a polyalphabetic cipher in binary

An Implementation of LSB Steganography Using DWT Technique

HOW TO SIMULATE AND REALIZE A DISAPPEARED CITY AND CITY LIFE?

A Block Cipher Based Pseudo Random Number Generator Secure against Side-Channel Key Recovery

HIGH PERFORMANCE BAUGH WOOLEY MULTIPLIER USING CARRY SKIP ADDER STRUCTURE

Four Level Multiple Image Sharing Scheme Using Visual Cryptography for Colour and Gray Scale Images Rajeev Kumar Sao 1, Mr. Prabhakar Sharma 2

Secure Transactio :An Credit Card Fraud Detection System Using Visual Cryptography

A Blueprint for Civil GPS Navigation Message Authentication

Fast-lock all-digital DLL and digitally-controlled phase shifter for DDR controller applications

Mathematics Explorers Club Fall 2012 Number Theory and Cryptography

Bit Permutation Instructions for Accelerating Software Cryptography

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

FOR HIGH SPEED LOW POWER APPLICATIONS USING RADIX-4 MODIFIED BOOTH ENCODER

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Analysis of Secure Text Embedding using Steganography

Network Security: Secret Key Cryptography

In this lecture: Lecture 8: ROM & Programmable Logic Devices

2. URDHAVA TIRYAKBHYAM METHOD

IMAGE TYPE WATER METER CHARACTER RECOGNITION BASED ON EMBEDDED DSP

Colored Image Ciphering with Key Image

JOINT BINARY CODE COMPRESSION AND ENCRYPTION

Progressive sharing of multiple images with sensitivity-controlled decoding

Asynchronous vs. Synchronous Design of RSA

Proceedings of Meetings on Acoustics

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

New High Capacity Secure Steganography Technique

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Transcription:

Design of Message uthentication Code with ES and SH-1 on FPG Kuo-Hsien Yeh, Yin-Zhen Liang Institute of pplied Information, Leader University, Tainan City, 709, Taiwan E-mail: khyeh@mail.leader.edu.tw TEL: 886-6-2558291 FX: 886-6-2550870 bstract Combining ES 128-bit and SH-1, we construct a Message uthentication Code and implement it on ltera FPG chip. We use the math of finite-field in ES algorithm to reduce the complexity of ES module. Implementation of our architecture needs 17153 logic cell elements on an FPG chip. The performance achieves 12.4 MHz in frequency. Moreover, the proposed design architecture does not require any memory bits. Key words Message uthentication Code (MC)dvanced Encryption Standard (ES) Secure Hash lgorithm (SH-1) Field Programmable Gate rray (FPG) 1. Introduction uthentication, which certifies data integrity and data origin, is becoming an important technique because the transfer of valuable information needed for electronic funds transfer, business contracts, etc. must be made across computer networks. Data integrity ensures that the data has not been modified or destroyed during transferring. Data origin authentication is the verification that the source of data received is as claimed. In general, Message uthentication Code (MC) can be achieved in three ways, Cipher-MC, Hash-MC (HMC) and Hash-Cipher-MCs [1,2]. Cipher-MC uses a cipher with some encryption techniques to process a message and takes the final result as the corresponding MC. HMCs are based on cryptographic hash functions. HMCs have two functionally distinct parameters, a message input and a secret key known only to the message originator and intended receiver. Hash-Cipher-MC combines a hash function and a cipher to construct MC [1,2]. In this paper, we are interested in the efficient Hash-Cipher-MCs which are secure based on the properties of hash functions H() and block ciphers E k (). E k (H(X)) of Hash-Cipher-MCs is referred to develop a constructing MC in FPG based on Rijndael s ES 128-bit of the U.S. National Institute of Standards and Technology (NIST) [3] and SH-1 of Federal Information Processing Standards Publications 180-1 (FIPS PUB 108-1) of NIST [4]. 2. lgorithms 2.1 MC generation The generation of our proposed MC will be computed with a given message M as:

MC = E k (Partial-SH-1(M)) where Partial-SH-1 extracts the left-most 128 bits of SH-1. In the meantime, the input key is used as the key of ES. Therefore, the output of ES is MC. The architecture is shown in Figure 1. In verification of MC, the receiver can verify the MC when he gets Message M and MC. The receiver decrypts the MC to get the Partial-SH-1 value and checks the correctness by computing Partial-SH-1(M). 2.2 ES In ES algorithm [3], the process of encryption consists of the following steps: n initial key addition transformation. The requisite number of rounds, with each round composed of four different transformations, byte substitution, row shifting, column mixing and key addition. final round is composed of three transformations, byte substitution, row shifting and key addition. Figure 2 shows the ES algorithm encryption structure. The transformations are described in [3]. For avoiding the use of look-up table and the decrease of security, a finite field inverse module is designed. It describes this algorithm based on standard basis for computing multiplicative inverse in GF(2 8 ) [5,6]. For a finite field GF(2 m ) element, the inversion of, -1, can be calculated by a series of power of. (1) This implies that the inverse of can be expressed as (2) Considering the ES algorithm, 254 can be represented by the multiplications of the square property of and 2 [5,6]. Let us use 2, the block diagram of -1 circuit is as shown in Figure 3. It has six multipliers; it is clear that it needs a large number of multipliers. This algorithm can implement the ByteSub transformation in ES easily. The improved structure, which is proposed by [5], uses the square property of 3 and 4. 254 can be represented as 8-1 = 2-2 = 254 = (( 3 ) 2 ( 3 ) 8 ) (( 3 ) ( 4 )) 32. (3) The improved inverse circuit can be drawn and shown in Figure 4. s shown in Figure 4, the number of multiplier in this improved finite field inverse circuit is reduced from 6 multipliers to 3 [5]. The improved finite field inverse circuit in the ByteSub transformation differs from [8]. The method of [8] had to save 256-byte memory and considerable amount of operations. 2.3 SH-1 For a message of length less than 2 64 bits, SH-1 produces a 160-bit condensed representation of the message called a message digest. The message digest is used during generation of a signature for the message [4,7]. There are three execution steps in SH-1 algorithm [4]: message padding, functions and constants used, and computing the message digest. To process Mi, we proceed as follows: 1. Divide M i into 16 words W 0, W 1,, W 15, where W 0 is the left-most word. 2. For t = 16 to 79 let W t = S 1 (W t-3 W t-8 W t-14 W t-16 ). (S n is shift-left n bits) 3. Let = H 0, B = H 1, C = H 2, D = H 3, E = H 4. 4. For t = 0 to 79 do TEMP = S 5 () + f t (B,C,D) + E + W t + K t ; E = D; D = C; C = S 30 (B); B = ;

= TEMP; 5. Let H 0 = H 0 +, H 1 = H 1 + B, H 2 = H 2 + C, H 3 = H 3 + D, H 4 = H 4 + E. Figure 5 shows the integral process of SH-1. In general, message schedule W 0, W 1,, W 79 is implemented as an array of eighty 32-bit words. However, we reduce the utility rate of the registers, so that we use the alternate method for computing a SH-1 message digest [4]. It uses an array of sixteen 32-bit words, W 0, W 1,, W 15, and it saves sixty-four 32-bit words of storage registers. They are designed separately in lera FPG chip device EP20K600EBC652, and we obtain a result, which the method of sixteen 32-bit words is less than the number of registers of eighty 32-bit words. The method of sixteen 32-bit words is a great register-saver. Table 1 shows the comparison of logic cell elements in lera FPG chip device EP20K600EBC652. 3. Design of MC with ES and SH-1 on FPG Implementation of our architecture needs 17153 logic cell elements and 388 pins on a FPG chip. The proposed design uses 128 bits I/O and achieves 12.4 MHz in frequency. Moreover, our proposed design does not need memory bits. Table 2 illustrates the results of the integral architecture. To test and verify our proposed MC, we make a test to prove it. If the attacker grabs the data and modifies the source data, a receiver will obtain falsified data. We assume that a sender transforms a data, which is 00112233445566778899aabbccddeeff in hexadecimal format. The MC generation produces a correct value, which is 4EBC740BEBE5F78C91592C5274E9F in hexadecimal format, and a receiver obtains it to decrypt the MC. Unfortunately, an attacker not only grabs a data in the middle but also modifies it while a sender and a receiver are transforming each other. The receiver will obtain a falsified MC, which is 4EBC740BEBE4078C91592C5274E9F in hexadecimal format, and he decrypts it. t last the receiver contrasts message digest, and he will detect his MC, which is falsified. The integral diagram is shown in Figure 6. The result of simulation is shown in Figure 7. 4. Conclusions Our proposed MC, which combines ES 128-bit and SH-1, utilizes the math of finite-field to improve ES algorithm and the alternate method for computing in SH-1. The multiplication and inverse operations can reduce the complexity of ES module. Moreover, our proposed design does not require any memory bits. There are two plans in our future work. First, in MC hardware implementation, we may use full custom design to implement the MC chip and improve the performance. Second, due to the continuous progress on System On Chip (SOC), MC, ES, and SH-1 modules will be applied Intellectual Property (IP). 5. References [1] Yi-Shiung Yeh and Chan-Chi Wang, Construct Message uthentication Code with One-Way Hash Functions and Block Ciphers, IEICE Transactions on Fundamentals of

Electronics, Communications and Computer Sciences, Feb. 1999, pp.390-393. [2] Ming-Hua Lee, Construct Message uthentication Code with SH-1 and ES, National Chiao Tung University in partial Fulfillment of the Requirements for the Degree of Master, Hsinchu, Taiwan, June 2000. [3] nnouncing the dvanced Encryption Standard (ES), Federal Information Processing Standards Publication 197, November 26, 2001. [4] Secure Hash Standard, Federal Information Processing Standards Publication 180-1, pril 17, 1995. [5] Jeng-Yang Hwang, The Design, Implementation and pplication of dvanced Encryption Standard lgorithm, I-Shou University in partial Fulfillment of the Requirements for the Degree of Master, Kaohsiung, Taiwan, June 2000. [6] M.H. Jing, Y.H. Chen, Y.T. Chang, and C.H. Hsu, The design of a fast inverse module in ES, Info-tech and Info-net, 2001. Proceedings. ICII 2001 - Beijing. 2001 International Conferences, Vol.3, pp.298 303, 2001. [7]. J. Menezes, P.C.V. Oorschot, and S.. Vanstone, Handbook of pplied Cryptography, CRC Press, 1997. [8], CPLD Implementation of RijndaelCipher, http://www.ccisa.org.tw/ / /ES/CPLD%20Implementation%2 0of%20Rijndael%20Cipher.ppt, November, 2000. Figure 1. The integral architecture of MC

Figure 2. The ES algorithm encryption structure Figure 3. The finite field inverse circuit using square property 8 24 3 3 2 6 30 254 4 4 7 32 224 Figure 4. The improved finite field inverse circuit

f 1 KW[0 19] f 2 KW[20 39] f 3 KW[40 59] f 4 KW[60 79] Figure 5. The integral process of SH-1 Sender MC Receiver MC Figure 6. The integral diagram

Figure 7. The result of simulation of falsified MC Table 1. The comparison of logic cell elements Table 2. The results of the integral architecture