2014
DOI: 10.1007/978-3-662-44709-3_24
|View full text |Cite
|
Sign up to set email alerts
|

FOAM: Searching for Hardware-Optimal SPN Structures and Components with a Fair Comparison

Abstract: Abstract. In this article, we propose a new comparison metric, the figure of adversarial merit (FOAM), which combines the inherent security provided by cryptographic structures and components with their implementation properties. To the best of our knowledge, this is the first such metric proposed to ensure a fairer comparison of cryptographic designs. We then apply this new metric to meaningful use cases by studying Substitution-Permutation Network permutations that are suited for hardware implementations, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
50
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 55 publications
(55 citation statements)
references
References 22 publications
(34 reference statements)
0
50
0
Order By: Relevance
“…While area-optimized implementations are important for some very constrained applications, throughput or throughput-over-area optimized implementations are also very relevant. Actually, looking at recently introduced efficiency measurements (the FOAM value -Figure Of Adversarial Merit [KPPY14]), one can see that our design choices are good for many types of implementations, which is exactly what makes a good general-purpose lightweight encryption scheme.…”
Section: Featuresmentioning
confidence: 85%
“…While area-optimized implementations are important for some very constrained applications, throughput or throughput-over-area optimized implementations are also very relevant. Actually, looking at recently introduced efficiency measurements (the FOAM value -Figure Of Adversarial Merit [KPPY14]), one can see that our design choices are good for many types of implementations, which is exactly what makes a good general-purpose lightweight encryption scheme.…”
Section: Featuresmentioning
confidence: 85%
“…As an example, one can generate a 32 × 32 involutory binary matrix with a branch number of 12 by using the following 4 × 4 generator matrix g=0001001101101101 and the MDS matrix M5=had()g,g12,g6,g8,g9,g2,g3,g4=M5T over double-struckF24 defined by the primitive polynomial x 4 + x + 1. Remark M 5 is the same 8 × 8 involutory MDS matrix over double-struckF24 given in .…”
Section: Proposed Methods For Generating Binary Diffusion Layersmentioning
confidence: 99%
“…The delay is reduced to (N-1) multiple to (log 2 N) is significant improvement in performance over RCA. t ripple = tpg + ( N-1) t AO + txor (1) t ksa = tpg + ( log 2 N) t AO + txor (2) B. Proposed Architecture Application of above structure for Interleaved and Montgomery Multiplier is presented in this sub-section.…”
Section: A Kogge-stone Addermentioning
confidence: 99%
“…Modular multiplication is the most frequently used operation in these cryptographic applications which requires high area and power. Performance of cryptographic applications are decided by Area-Time complexity [1][2][3]. As a result, an efficient implementation becomes critical.…”
Section: Introductionmentioning
confidence: 99%