2019
DOI: 10.1007/978-3-030-35423-7_26
|View full text |Cite
|
Sign up to set email alerts
|

Exploring Lightweight Efficiency of ForkAES

Abstract: Recently the ForkAES construction was proposed by Andreeva et al. for efficiently performing authenticated encryption of very short messages on next generation IoT devices. The ForkAES tweakable block cipher uses around one and a half AES encryption calls to produce a pair of ciphertexts for any given plaintext. However the only downside of the construction is that it needs to store an extra state of 128 bits in addition with the storage elements required to perform AES encryption. Thus a hardware implementati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…Using the sieve method based on rapid sorting, select 2 m+8 × (2 m+8 − 1)÷2 × 2 − 160 ≈ 2 2m− 145 pairs of (C 0 , y AK 8 ), where Δy SB 8,(0,1,2,3) ≠ 0 and ΔC SB 0,(0,1,2,3,4,5,6,7) ≠ 0, and the difference value of the other 20 bytes is zero; then, store the ordered texts (C 0, (8,9,10,11,12,13,14,15) , y SB 8,(0,1,2,3) ) in Table Ω 3 . For the second attack trail, attackers use the same 2 m known plaintexts, select 2 8 tweaks that take all possible values in T (2) , and fix the other 7 bytes to constant values.…”
Section: E Attack With Encryptionmentioning
confidence: 99%
See 2 more Smart Citations
“…Using the sieve method based on rapid sorting, select 2 m+8 × (2 m+8 − 1)÷2 × 2 − 160 ≈ 2 2m− 145 pairs of (C 0 , y AK 8 ), where Δy SB 8,(0,1,2,3) ≠ 0 and ΔC SB 0,(0,1,2,3,4,5,6,7) ≠ 0, and the difference value of the other 20 bytes is zero; then, store the ordered texts (C 0, (8,9,10,11,12,13,14,15) , y SB 8,(0,1,2,3) ) in Table Ω 3 . For the second attack trail, attackers use the same 2 m known plaintexts, select 2 8 tweaks that take all possible values in T (2) , and fix the other 7 bytes to constant values.…”
Section: E Attack With Encryptionmentioning
confidence: 99%
“…Andreeva et al [1] also proposed a forkcipher named ForkAES. Balli and Banik [2] analysed the hardware performance of ForkAES. ey achieve a hardware implementation of ForkAES without any additional storage cost if the AES circuit can also perform decryption, thereby further optimizing the storage cost.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In order to obtain higher number of round keys, the authors extend the 6-bit LFSR into a 7-bit one. Implementing ForkSkinny requires an additional 128-bit register to store the forking state, unless the block cipher supports combined encryption and decryption functionality [BB19]. Compared to generic unrolling, there is a caveat in unrolling ForkSkinny.…”
Section: Forkskinnymentioning
confidence: 99%