2004
DOI: 10.1007/978-3-540-25937-4_18
|View full text |Cite
|
Sign up to set email alerts
|

ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware

Abstract: Abstract. We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are involutional and allow very efficient combinations of encryption/decryption. Hardware implementations of ICEBERG allow to change the key at every clock cycle without any performance loss and its round keys are derived "on-the-fly" in encryption and decryption modes (no storage of round keys is needed). The resulting design offers bette… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0
2

Year Published

2004
2004
2022
2022

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 74 publications
(52 citation statements)
references
References 26 publications
(27 reference statements)
0
48
0
2
Order By: Relevance
“…For example, S-Boxes used in Whirlpool [20], Zorro [38], Iceberg [39], Khazad [40], CLEFIA [41], and Robin and Fantomas [42] are permutations of 8 bits based on smaller S-Boxes. In many cases, such a structure is used to allow an efficient implementation of the S-Box in hardware or using a bit-sliced approach.…”
Section: Hardware Implementationmentioning
confidence: 99%
“…For example, S-Boxes used in Whirlpool [20], Zorro [38], Iceberg [39], Khazad [40], CLEFIA [41], and Robin and Fantomas [42] are permutations of 8 bits based on smaller S-Boxes. In many cases, such a structure is used to allow an efficient implementation of the S-Box in hardware or using a bit-sliced approach.…”
Section: Hardware Implementationmentioning
confidence: 99%
“…In Hardware Implementation [9] of CA, the experimental Result show that our cellular Automata produces better sequential fault convergence then the linear feedback shift register .Here we are applying the linear hybrid cellular automata rules [12].…”
Section: Sequential Fault Convergencementioning
confidence: 99%
“…exclusive-or with the round key introduces the key material. Recently, several SPN symmetric block ciphers that are composed of involution functions have been proposed and analyzed [10,11,12,13,14]. In an involutional SPN cipher, the non-linear S-Box layer and the linear diffusion layer are involutions.…”
Section: Involutional Block Ciphersmentioning
confidence: 99%