Proposed Optimized Hardware Implementation for the S-box of the PRESENT Algorithm Using Combinational Logic Circuits
DOI:
https://doi.org/10.54654/isj.v3i23.1070Keywords:
PRESENT, S-box, lightweight block cipher, combitional logic circuitTóm tắt
The lightweight block cipher PRESENT has been standardized by ISO/IEC 29192-2:2012 and TCVN 12854-2:2020. It is a lightweight block cipher with a block size of 64 bits and key sizes of either 80 or 128 bits. For lightweight block ciphers commonly deployed in resource-constrained embedded and IoT devices, resource optimization is a top priority. The S-box, as the only nonlinear component, plays a crucial role in ensuring the security of the cryptographic algorithm by providing resistance against nonlinear and differential attacks. The S-box also consumes the most resources compared to other components of the algorithm, making the optimization of the S-box implementation essential for minimizing the overall resource usage of the algorithm. The S-box of the PRESENT algorithm is used in many other block cipher algorithms. By surveying existing research on PRESENT implementations and analyzing S-box deployment methods based on combinational logic circuits, this paper proposes new architectures for implementing S-boxes using the lowest resource-consuming logic gates, such as 2-input NAND gates, 2-input NOR gates, and NOT gates. The results demonstrate that the proposed methods achieve reduced resources compared to other designs
Downloads
References
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, Y. Seurin, and C. Vikkelsoe, “Present: An ultra-lightweight block cipher,” in Proceedings of CHES 2007, vol. 4727, pp. 450–466, 2007.
P. Kocher, J. Jaffe, and B. Jun, “Differential power analysis,” in Advances in Cryptology — CRYPTO’99, Lecture Notes in Computer Science, vol. 1666. Springer, Berlin, Heidelberg, pp. 388–397, 1999.
A. F. Echevarría, R. R. Aulet, and A. G. Gómez, “On some relations of sca-related properties of S-box under the hamming weight leakage mode,” Journal of Science and Technology on Information Security, vol. 3, no. 17, pp. 3–9, 2023.
D.P. Phan, N. H. Minh, D. B. Anh, K. D. N. Binh, T.T. Ha, H. T. Thuc, and P. C. Kha, “Construction of robust lightweight s-boxes using enhanced logistic and enhanced sine maps,” IEEE Access, vol. 12, pp. 63976-63994, 2024.
N. V. Long and L. D. Duc, “Đề xuất s-hộp có tính chất mật mã tốt cho hoán vị của hàm băm keccak,” Journal of Science and Technology on Information Security, vol. 1, no. 11, pp. 32–45, 2020.
E. B. Kavun and T. Yalcin, “Ram-based ultralightweight fpga implementation of present,” in 2011 International Conference on Reconfigurable Computing and FPGAs. IEEE, pp. 280–285, 2011.
M. R and N. K. V, “Optimized implementation of s-box and inverse s-box for present lightweight block cipher,” in 2023 2nd International Conference on Vision Towards Emerging Trends in Communication and Networking Technologies (ViTECoN), pp. 1–5, 2023.
J. J. Tay, M. L. D. Wong, M. M. Wong, C. Zhang, and I. Hijazin, “Compact fpga implementation of present with boolean s-box,” in 2015 6th Asia Symposium on Quality Electronic Design (ASQED), pp. 144–148, 2015.
B. Rashidi, “Efficient and high-throughput application specific integrated circuit implementations of hight and present block ciphers,” IET Circuits, Devices & Systems, vol. 13, no. 6, pp. 731–740, 2019.
T. Peyrin, “Lightweight symmetric-key cryptography.” Suzdal, Russia: CTCRYPT 2018, pp. 8-10, May 29th 2018.
Downloads
Published
How to Cite
Issue
Section
License
Proposed Policy for Journals That Offer Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
Proposed Policy for Journals That Offer Delayed Open Access
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication, with the work [SPECIFY PERIOD OF TIME] after publication simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).