Ukrainian National Encryption Standards for FPGA Based Embedded Systems
DOI:
https://doi.org/10.31861/sisiot2023.1.01005Keywords:
DSTU 7624:2014, DSTU 8845:2019, FPGA, Embedded SystemsAbstract
The paper presents the hardware implementation based on FPGA of the main cryptographic transformations of the symmetric transformation algorithm of DSTU 7624:2014 and the stream cipher of DSTU 8845:2019, which are the national encryption standards of Ukraine. In the case of DSTU 7624: 2014 developed and implemented a hardware implementation for multiplication of two polynomials modulo x8+x4+x3+x2+1 in the form of a combinational circuit that allows to execute the MixColumn transformation by one cycle. SubBytes transformation is implemented based on asynchronous read-only memory. For stream cipher, DSTU 8845:2019 the nonlinear function T are implemented as subtitution byte operation in the form of precalculated cells of ROM memory. The multiplication function by α and α-1 in Galois field arithmetic GF (2 64) is realized based on ROM and combinational logic. The control of the modes of operation of the shift register with linear feedback is performed based on a FSM. Both hardware implementations of encryption standards have been verified by the authors according to the specified data in the standard, and their HDL code can be provided by the authors for further research to interested parties.
Downloads
References
Ya. R. Sovin, V. I. Otenko, E. F. Shtefanyuk “Effective implementation of the DSTU 7624:2014 block symmetric encryption algorithm ("Kalyna") for 8/16/32-bit embedded systems” Modern information protection, № 3, pp. 6-16, 2017.
А.А. Kuznetsov, D.V. Іvanenko, E.P. Kolovanova “Perspective block cipher «Kalyna» modelling” Applied Radio Electronics, vol. 13, № 3, pp. 201–207, 2014.
Gorbenko I., Kuznetsov A., Lutsenko M. and Ivanenko D. The research of modern stream ciphers // 4th International Scientific-Practical Conference Problems of Infocommu-nications. Science and Technology (PIC S&T), Kharkiv, pp. 207-210, 2017.
DSTU 7624:2014. Information Technology. Cryptographic protection of information. Algorithm of symmetric block transformation. [Text]. - Enter 01–07–2015. - K.: Ministry of Economic Development of Ukraine, 2015.
O. O. Kuznetsov, V. O. Frolenko, E. S. Yeromin, D. V. Ivanenko “Research of cross-platform implementations of stream symmetric ciphers” Radioengineering, № 193. – pp. 94–106, 2014.
Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang, A new SNOW stream cipher called SNOW-V, IACR Trans Symmetric Cryptol 2019 (3) (2019) 1–42, 10.13154/tosc.v2019.i3.1-42.
Information Technology. Cryptographic protection of information. Algorithm of symmetric flow transformation. DSTU 8845:2019, 2019.
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A. and Uhsadel, L., “A survey of lightweight-cryptography implementations” IEEE Design & Test of Computers, 24(6), pp. 522-533, 2007
Rinne S., Eisen-barth T., Paar C. “Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers” ECRYPT Workshop Software Perfor-mance Enhancement for Encryption and Decryption, pp. 33-43, 2007.
W. Diehl, F. Farahmand, P. Yalla, J. -P. Kaps and K. Gaj, "Comparison of hardware and software implementations of selected lightweight block ciphers," 2017 27th International Conference on Field Programmable Logic and Applications (FPL), Ghent, Belgium, 2017, pp. 1-4, doi: 10.23919/FPL.2017.8056808.
Mohammed El-Hajj, Ahmad Fadlallah, "Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms", 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), pp.121-126, 2022.