Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Generalisation of Hadamard matrix to generate involutory MDS matrices for lightweight cryptography

In this study, the authors generalise Hadamard matrix over and propose a new form of Hadamard matrix, which they call generalised Hadamard (GHadamard) matrix. Then, they focus on generating lightweight (involutory) maximum distance separable (MDS) matrices. They also extend this idea to any matrix form, where k is not necessarily a power of 2. The new matrix form, GHadamard matrix, is used to generate new involutory MDS matrices over and , and involutory/non-involutory MDS matrices over by considering the minimum exclusive OR (XOR) count, which is a metric defined to estimate the hardware implementation cost. In this context, they improve the best-known results of XOR counts for involutory/non-involutory MDS matrices over .

References

    1. 1)
      • 15. MacWilliams, F.J., Sloane, N.J.A.: ‘The theory of error-correcting codes’ (North Holland Publishing Co., North-Holland, Amsterdam, 1977).
    2. 2)
      • 13. Khoo, K., Peyrin, T., Poschmann, A.Y., et al: ‘FOAM: searching for hardware-optimal SPN structures and components with a fair comparison’. Cryptographic Hardware and Embedded Systems (CHES 2014), 2014 (LNCS, 8731), pp. 433450.
    3. 3)
      • 5. Sajadieh, M., Dakhilalian, M., Mala, H., et al: ‘On construction of involutory MDS matrices from Vandermonde matrices in GF(2q)’, Des. Codes Cryptogr., 2012, 64, pp. 287308.
    4. 4)
      • 14. Sim, S.M., Khoo, K., Oggier, F., et al: ‘Lightweight MDS involution matrices’. Fast Software Encryption (FSE 2015), 2015 (LNCS, 9054), pp. 471493.
    5. 5)
      • 17. Junod, P., Vaudenay, S.: ‘Perfect diffusion primitives for block ciphers’. Selected Areas in Cryptography (SAC 2004), 2004 (LNCS, 3357), pp. 8499.
    6. 6)
      • 4. Lacan, J., Fimes, J.: ‘Systematic MDS erasure codes based on Vandermonde matrices’, IEEE Trans. Commun. Lett., 2004, 8, pp. 570572.
    7. 7)
      • 1. Shannon, C.E.: ‘Communication theory of secrecy systems’, Bell Syst. Tech. J., 1949, 28, pp. 656715.
    8. 8)
      • 8. Augot, D., Finiasz, M.: ‘Direct construction of recursive MDS diffusion layers using shortened BCH codes’. Fast Software Encryption (FSE 2014), 2014 (LNCS, 8540), pp. 317.
    9. 9)
      • 2. Daemen, J., Rijmen, V.: ‘The design of Rijndael, AES – the advanced encryption standard’ (Springer, 2002).
    10. 10)
      • 12. Sarkar, S., Syed, H.: ‘Analysis of Toeplitz MDS matrices’. ACISP 2017, 2017 (LNCS, 10343), pp. 318.
    11. 11)
      • 7. Gupta, K.C., Ray, I.G.: ‘On constructions of MDS matrices from companion matrices for lightweight cryptography’. CD-ARES 2013, Workshops: MoCrySEn, 2013 pp. 2943.
    12. 12)
      • 9. Li, Y., Wang, M.: ‘On the construction of lightweight circulant involutory MDS matrices’. Fast Software Encryption (FSE 2016), 2016 (LNCS, 9783), pp. 121139.
    13. 13)
      • 6. Guo, J., Peyrin, T., Poschmann, A.: ‘The PHOTON family of lightweight hash functions’. CRYPTO 2011, 2011 (LNCS, 6841), pp. 222239.
    14. 14)
      • 10. Liu, M., Sim, S.M.: ‘Lightweight MDS generalized circulant matrices’. Fast Software Encryption (FSE 2016), 2016 (LNCS, 9783), pp. 101120.
    15. 15)
      • 16. Sarkar, S., Sim, S.M.: ‘A deeper understanding of the XOR count distribution in the context of lightweight cryptography’. AFRICACRYPT 2016, 2016 (LNCS, 9646), pp. 167182.
    16. 16)
      • 3. Youssef, A.M., Mister, S., Tavares, S.E.: ‘On the design of linear transformation for substitution-permutation encryption networks’. Proc. Selected Areas in Cryptography (SAC'97), 1997, pp. 4048.
    17. 17)
      • 11. Sarkar, S., Syed, H.: ‘Lightweight diffusion layer: importance of Toeplitz matrices’, IACR Trans. Symmetric Cryptol., 2016, 2016, (1), pp. 95113.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2017.0156
Loading

Related content

content/journals/10.1049/iet-ifs.2017.0156
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address