Hardware Implementation of Bluetooth Security
IEEE Pervasive Computing
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
A Generalized Description of DES-based and Benes-based Permutationgenerators
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
A DES ASIC Suitable for Network Encryption at 10 Gbps and Beyond
CHES '99 Proceedings of the First International Workshop on Cryptographic Hardware and Embedded Systems
An optimal low-power/high performance DDP-based Cobra-H64 cipher
Proceedings of the 3rd international conference on Mobile multimedia communications
Security analysis of the full-round DDO-64 block cipher
Journal of Systems and Software
Security analysis of the SCO-family using key schedules
Information Sciences: an International Journal
Full custom low-power/high performance DDP-based Cobra-H64 cipher
Computers and Electrical Engineering
TWIS --- A Lightweight Block Cipher
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Related-key amplified boomerang attacks on the full-round eagle-64 and eagle-128
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Full-round differential attack on TWIS block cipher
WISA'10 Proceedings of the 11th international conference on Information security applications
Related-key attacks on the full-round cobra-f64a and cobra-f64b
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Related-Key differential attacks on cobra-h64 and cobra-h128
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Hi-index | 0.00 |
Using Data-Dependent (DD) Permutations (DDP) as main cryptographic primitive two new ciphers are presented: ten-round Cobra-H64, and twelve-round Cobra-H128. The designed ciphers operate efficiently with different plaintext lengths, 64 and 128-bit, for Cobra-H64 and Cobra-H128, respectively. Both of them use very simple key scheduling that defines high performance, especially in the case of frequent key refreshing. A novel feature of Cobra-H64 and Cobra-H128 is the use of the Switchable Operations which prevent the weak keys. The offered high-level security strength does not sacrifice the implementation performance, of both ciphers. Architecture, design and hardware implementation of the two ciphers are presented. The synthesis results for both FPGA and ASIC implementations prove that Cobra-H64 and Cobra-H128 are very flexible and powerful new ciphers, especially for high-speed networks. The achieved hardware performance and the implementation area cost of Cobra-H64 and Cobra-H128 are compared with other ciphers, used in security layers of wireless protocols (Bluetooth, WAP, OMA, UMTS and IEEE 802.11). From these comparisons it is proven that the two proposed are flexible new ciphers with better performance in most of the cases, suitable for wireless communications networks of present and future.