Low Power Design of Highly Secured Crypto Processors

Abstract

In this paper we propose the design of ring learning with errors (LWE) crypto processors using Number Theoretic Transform (NTT) cores and Gaussian samplers based on the inverse transform method. The NTT cores are designed using radix-2 and radix-8 decimation-in-frequency NTT algorithms and pipeline architectures. The designed Gaussian samplers are an optimized parallel implementation of the inverse transform method and they use pipeline architecture to generate a sample every clock cycle after the latency period, that is, the output is Obtained in a fixed time achieving timing attack resistant ring–LWE crypto processors. Also, taking into account the national institute of standards and technology recommendation, a random number generator is designed to generate the input of the Gaussian sampler.

Country : India

1 Rajan Lavanya2 M.Vidhyia3 G.Kanagaraj

  1. M.E Scholar, Department of VLSI, AVS Engineering College, Salem, Tamilnadu, India
  2. Assistant Professor, Department of ECE, AVS Engineering College, Salem, Tamilnadu, India
  3. Assistant Professor, Department of ECE, AVS Engineering College, Salem, Tamilnadu, India

IRJIET, Volume 2, Issue 1, March 2018 pp. 32-37

References

  1. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials,” J. Cryptol., vol. 18, no. 4, pp. 291–311, 2005.
  2. Bogdanov, D. Khovratovich, and C. Rechberger, “Biclique cryptanalysis of the full AES,” in Advances in Cryptology (Lecture Notes in Computer Science), vol. 7073. Berlin, Germany: Springer-Verlag, 2011, pp. 344–371.
  3. De Cannière, O. Dunkelman, and M. Kneževi´c, “KATAN and KTANTAN—A family of small and efficient hardware-oriented block ciphers,” in Cryptographic Hardware and Embedded Systems, vol. 574 . Berlin, Germany: Springer-Verlag, 2009, pp. 272–288.
  4. Intel Architecture Software Developer’s Manual, Intel Corporation, Santa Clara, CA, USA, 1997.
  5. J. Black, P. Rogaway, and T. Shrimpton, “Encryption-scheme security    in the presence of key dependent messages” in Selected Areas in     Cryptography      (Lecture Notes in Computer Science), vol. 2595. Berlin, Germany: Springer- Verlag, 2003, pp. 62–75.
  6. J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, “The LED block cipher,” in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, 2011, pp. 326–341.
  7. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister, “System architecture directions for networked sensors,” ACM SIGPLAN Notices, vol. 35, no. 11, pp. 93–104, 2000.
  8. J. Kumar and S. Nirmala, “Encryption of images based on genetic algorithm—A new approach,” in Advances in Computer Science, Engineering & Applications (Advances in Intelligent Systems and Computing), vol. 167. Berlin, Germany: Springer-Verlag, 2012, pp. 783–791.
  9. K. Biswas, V. Muthukkumarasamy, E. Sithirasenan, and K. Singh, “A simple lightweight encryption scheme for wireless sensor networks,” in Distributed Computing and Networking,vol. 8314. Berlin, Germany: Springer-Verlag, 2014, pp. 499–504.
  10. M. Amara and A. Siad, “Elliptic curve cryptography and its applications, in Proc. 7th Int. WOSSPA, May 2011, pp. 247–250.