DOI QR코드

DOI QR Code

Optimization of ARIA Block-Cipher Algorithm for Embedded Systems with 16-bits Processors

  • Lee, Wan Yeon (Dept. of Computer Science, Dongduk Women's University) ;
  • Choi, Yun-Seok (Dept. of Computer Science, Dongduk Women's University)
  • 투고 : 2015.12.07
  • 심사 : 2016.01.08
  • 발행 : 2016.02.29

초록

In this paper, we propose the 16-bits optimization design of the ARIA block-cipher algorithm for embedded systems with 16-bits processors. The proposed design adopts 16-bits XOR operations and rotated shift operations as many as possible. Also, the proposed design extends 8-bits array variables into 16-bits array variables for faster chained matrix multiplication. In evaluation experiments, our design is compared to the previous 32-bits optimized design and 8-bits optimized design. Our 16-bits optimized design yields about 20% faster execution speed and about 28% smaller footprint than 32-bits optimized code. Also, our design yields about 91% faster execution speed with larger footprint than 8-bits optimized code.

키워드

참고문헌

  1. M. Ebrahim, S. Khan and U. B. Khalid, "Symmetric Algorithm Survey: A Comparative Analysis," International Journal of Computer Applications (Jan. 2013), vol. 61, no. 20, pp. 12-19.
  2. T. Eisenbarth, S. Kumar, C. Paar, A. Poschmann and L. Uhsadel, "A Survey of Lightweight- Cryptography Implementations," IEEE Design & Test of Computers (Nov.-Dec. 2007), vol. 24, no. 6, pp. 522-533. https://doi.org/10.1109/MDT.2007.178
  3. S. B. Sasi and N. Sivan, "A Survey on Cryptography Using Optimization Algorithms in WSNs," Indian Journal of Science and Technology (Feb. 2015), vol. 8, no. 3, pp. 216-221.
  4. William Stalling, Cryptography and Network Security: Principles and Practices, 6th edition, Prentice Hall, (2013).
  5. National Institute of Standards and Technology (NIST), "Advanced Encryption Standards (AES)," Federal Information Processing Standards Publication 197 (Nov. 2001), pp. 1-26.
  6. KS X 1213:2004, "128 bit Block Encryption Algorithm ARIA," Korean Agency for Technology and Standards (Dec. 2004).
  7. D. Kwon, J. Kim, S. Park, S. H. Sung, Y. Sohn, J. W. Song, Y. Yeom, E. Yoon, S. Lee, J. Lee, S. Chee, D. Han and J. Hong, "New Block Cipher: ARIA," International Conference on Information Security and Cryptology (Nov. 2003), Lecture Notes in Computer Science 2971, pp. 432-445.
  8. H. I. Kim, C. Park, D. Hong, and C. Seo, "A LEA Implementation Study on UICC-16bit", Journal of The Korea Institute of Information Security & Cryptology (Aug. 2004), vol. 24, no. 4, pp. 585-591. https://doi.org/10.13089/JKIISC.2014.24.4.585
  9. Y. W. Law, J. Doumen and P. Hartel, "Survey and Benchmark of Block Cipher for Wireless Sensor Networks," ACM Transactions on Sensor Networks (Feb. 2006), vol. 2, no. 1, pp. 65-93. https://doi.org/10.1145/1138127.1138130
  10. Korea Internet & Security Agency (KISA), Available at http://seed.kisa.or.kr/iwt/ko/bbs/EgovReferenceDetail.do?bbsId=BBSMSTR_000000000002&nttId=39&pageIndex=1&searchCnd=&sea rchWrd=