Architecture for the Secret-Key BC3 Cryptography Algorithm

Arif Sasongko, Hidayat Hidayat, Yusuf Kurniawan, Sarwono Sutikno

Abstract


Cryptography is a very important aspect in data security. The focus of research in this field is shifting from merely security aspect to consider as well the  implementation  aspect.  This  paper  aims  to  introduce  BC3  algorithm  with focus  on  its  hardware  implementation.  It  proposes  an  architecture  for  the hardware  implementation  for  this  algorithm.  BC3  algorithm  is  a  secret-key cryptography  algorithm  developed  with  two  considerations:  robustness  and implementation  efficiency.  This  algorithm  has  been  implemented  on  software and has good performance compared to AES algorithm. BC3 is improvement of BC2 and AE cryptographic algorithm and it is expected to have the same level of robustness and to gain competitive advantages in the implementation aspect. The development of the architecture gives much attention on (1) resource sharing and (2)  having  single  clock  for  each  round.  It  exploits  regularity  of  the  algorithm. This architecture is then implemented on an FPGA. This implementation is three times smaller area than AES, but about five times faster. Furthermore, this BC3 hardware  implementation  has  better  performance  compared  to  BC3  software both in key expansion stage and randomizing stage. For the future, the security of this implementation must be reviewed especially against side channel attack.


Full Text:

PDF

References


Goldreich, O., Foundations of Cryptography, Vol. I Basic Tools, Cambridge, 2006

Stallings, W., Cryptography and Network Security Principles and Practices (4th ed.). New Jersey: Prentice Hall, 2005.

Kurniawan, Y., Algoritma Enkripsi Indonesia BC3, http://ysfk2008.wordpress.com, Accessed on November, 2011.

Satoh, A., Morioka, S., Takano, K., & Munetoh, S., A Compact Rijndael Hardware Architecture with S-Box Optimization, ASIACRYPT 2001, LNCS 2248. pp. 239-254, 2001.

Kurniawan, Y., Suwandi, A., Mardianto, M. S., Supriana, I., Sutikno, S. The New Block Cihper: BC2, International Journal of Network Security, 8(1), pp. 16-24, 2009.

Kurniawan, Y., Analisis Sandi Diferensial AE3, Proceeding of Seminar Nasional IC2007 BINUS University, Indonesia, 2007.

Biryukov, A., Khovratovich, D. & Nikolić, I. , Distinguisher and Related-Key Attack on the Full AES-256, Lecture Notes in Computer Science, 5677/2009, Springer-Verlag, 2009

Kocher, Paul C., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO, 1996.

---, DBC2C20-Cyclone II Development Board, Altera, 2008

Kurniawan, Y., Algoritma Enkripsi AE3 dan Analisis Sandi Linear, Proceeding of Konferensi Nasional Sistem Informasi, Indonesia, 2008.

Matsui, M., Nakajimi, J., A Description of Camellia Encryption Algorithm, from http://www.ipa.go.jp/security/rfc/RFC3713EN.html,Accessed on Februari, 2009.

Katz, J. & Lindell, Y., Introduction to Modern Cryptography, Chapman & Hall/CRC, 2008.

Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J.& Tokita, T., Camellia : A 128-Bit Block Cipher Suitable for Multiple Platforms — Design and Analysis, Lecture Notes in Computer Science, 2012/2001, Springer-Verlag, 2001

Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M. & Marchesin, S.,Efficient Software Implementation of AES on 32-Bit Platforms, Lecture Notes in Computer Science, 2523/2003, Springer-Verlag, 2003.




DOI: http://dx.doi.org/10.5614%2Fitbj.ict.2011.5.2.4

Refbacks

  • There are currently no refbacks.


Contact Information:

ITB Journal Publisher, LPPM – ITB, 

Center for Research and Community Services (CRCS) Building Floor 7th, 
Jl. Ganesha No. 10 Bandung 40132, Indonesia,

Tel. +62-22-86010080,

Fax.: +62-22-86010051;

e-mail: jictra@lppm.itb.ac.id.