Architecture for the Secret-Key BC3 Cryptography Algorithm
Cryptography is a very important aspect in data security. The focus of research in this field is shifting from merely security aspect to consider as well the implementation aspect. This paper aims to introduce BC3 algorithm with focus on its hardware implementation. It proposes an architecture for the hardware implementation for this algorithm. BC3 algorithm is a secret-key cryptography algorithm developed with two considerations: robustness and implementation efficiency. This algorithm has been implemented on software and has good performance compared to AES algorithm. BC3 is improvement of BC2 and AE cryptographic algorithm and it is expected to have the same level of robustness and to gain competitive advantages in the implementation aspect. The development of the architecture gives much attention on (1) resource sharing and (2) having single clock for each round. It exploits regularity of the algorithm. This architecture is then implemented on an FPGA. This implementation is three times smaller area than AES, but about five times faster. Furthermore, this BC3 hardware implementation has better performance compared to BC3 software both in key expansion stage and randomizing stage. For the future, the security of this implementation must be reviewed especially against side channel attack.
Goldreich, O., Foundations of Cryptography, Vol. I Basic Tools, Cambridge, 2006
Stallings, W., Cryptography and Network Security Principles and Practices (4th ed.). New Jersey: Prentice Hall, 2005.
Kurniawan, Y., Algoritma Enkripsi Indonesia BC3, http://ysfk2008.wordpress.com, Accessed on November, 2011.
Satoh, A., Morioka, S., Takano, K., & Munetoh, S., A Compact Rijndael Hardware Architecture with S-Box Optimization, ASIACRYPT 2001, LNCS 2248. pp. 239-254, 2001.
Kurniawan, Y., Suwandi, A., Mardianto, M. S., Supriana, I., Sutikno, S. The New Block Cihper: BC2, International Journal of Network Security, 8(1), pp. 16-24, 2009.
Kurniawan, Y., Analisis Sandi Diferensial AE3, Proceeding of Seminar Nasional IC2007 BINUS University, Indonesia, 2007.
Biryukov, A., Khovratovich, D. & Nikolić, I. , Distinguisher and Related-Key Attack on the Full AES-256, Lecture Notes in Computer Science, 5677/2009, Springer-Verlag, 2009
Kocher, Paul C., Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems, CRYPTO, 1996.
---, DBC2C20-Cyclone II Development Board, Altera, 2008
Kurniawan, Y., Algoritma Enkripsi AE3 dan Analisis Sandi Linear, Proceeding of Konferensi Nasional Sistem Informasi, Indonesia, 2008.
Matsui, M., Nakajimi, J., A Description of Camellia Encryption Algorithm, from http://www.ipa.go.jp/security/rfc/RFC3713EN.html,Accessed on Februari, 2009.
Katz, J. & Lindell, Y., Introduction to Modern Cryptography, Chapman & Hall/CRC, 2008.
Aoki, K., Ichikawa, T., Kanda, M., Matsui, M., Moriai, S., Nakajima, J.& Tokita, T., Camellia : A 128-Bit Block Cipher Suitable for Multiple Platforms — Design and Analysis, Lecture Notes in Computer Science, 2012/2001, Springer-Verlag, 2001
Bertoni, G., Breveglieri, L., Fragneto, P., Macchetti, M. & Marchesin, S.,Efficient Software Implementation of AES on 32-Bit Platforms, Lecture Notes in Computer Science, 2523/2003, Springer-Verlag, 2003.
- There are currently no refbacks.
ITB Journal Publisher, LPPM – ITB,
Center for Research and Community Services (CRCS) Building Floor 7th,
Jl. Ganesha No. 10 Bandung 40132, Indonesia,