Ukrainian National Encryption Standards for FPGA Based Embedded Systems

Authors

DOI:

https://doi.org/10.31861/sisiot2023.1.01005

Keywords:

DSTU 7624:2014, DSTU 8845:2019, FPGA, Embedded Systems

Abstract

The paper presents the hardware implementation based on FPGA of the main cryptographic transformations of the symmetric transformation algorithm of DSTU 7624:2014 and the stream cipher of DSTU 8845:2019, which are the national encryption standards of Ukraine. In the case of DSTU 7624: 2014 developed and implemented a hardware implementation for multiplication of two polynomials modulo x8+x4+x3+x2+1 in the form of a combinational circuit that allows to execute the MixColumn transformation by one cycle. SubBytes transformation is implemented based on asynchronous read-only memory.  For stream cipher, DSTU 8845:2019 the nonlinear  function T are implemented as subtitution byte operation in the form of precalculated cells of ROM memory. The multiplication function by α and α-1  in Galois field arithmetic GF (2 64) is realized based on ROM and combinational logic. The control of the modes of operation of the shift register with linear feedback is performed based on a FSM. Both hardware implementations of encryption standards have been verified by the authors according to the specified data in the standard, and their HDL code can be provided by the authors for further research to interested parties.

Downloads

Download data is not yet available.

Author Biographies

  • Oleh Krulikovskyi, Yuriy Fedkovych Chernivtsi National University

    Assistant professor at Radio Engineering and Information Security Department of Yuriy Fedkovych Chernivtsi National University. His research field covers digital signal processing, FPGA and hardware cryptography. Author of more than 20 publications.

  • Serhii Haliuk, Yuriy Fedkovych Chernivtsi National University

    Assistant professor at Radio Engineering and Information Security Department of Yuriy Fedkovych Chernivtsi National University. His research interest covers the development of the different components of hidden communication systems. Author of more than 20 publications.

  • Ihor Safronov, Yuriy Fedkovych Chernivtsi National University

    PhD student at Radio Engineering and Information Security Department of Yuriy Fedkovych Chernivtsi National University. His research field covers digital signal processing, PCB layout and cicrcuit design. Author of more than 5 publications.

  • Ivan Gorbenko, V. N. Karazin Kharkiv National University

    Professor of the Department of Security of Information Systems and Technologies of V.N. Karazin Kharkiv National University, doctor of technical sciences, professor. Field of scientific interests: cryptographic protection of information, cryptographic systems and protocols, post-quantum cryptography. Co-developer of four Ukrainian national standards of cryptographic transformations. Author of more than 300 publications, including 18 educational books and monographs, 85 patents.

References

Ya. R. Sovin, V. I. Otenko, E. F. Shtefanyuk “Effective implementation of the DSTU 7624:2014 block symmetric encryption algorithm ("Kalyna") for 8/16/32-bit embedded systems” Modern information protection, № 3, pp. 6-16, 2017.

А.А. Kuznetsov, D.V. Іvanenko, E.P. Kolovanova “Perspective block cipher «Kalyna» modelling” Applied Radio Electronics, vol. 13, № 3, pp. 201–207, 2014.

Gorbenko I., Kuznetsov A., Lutsenko M. and Ivanenko D. The research of modern stream ciphers // 4th International Scientific-Practical Conference Problems of Infocommu-nications. Science and Technology (PIC S&T), Kharkiv, pp. 207-210, 2017.

DSTU 7624:2014. Information Technology. Cryptographic protection of information. Algorithm of symmetric block transformation. [Text]. - Enter 01–07–2015. - K.: Ministry of Economic Development of Ukraine, 2015.

O. O. Kuznetsov, V. O. Frolenko, E. S. Yeromin, D. V. Ivanenko “Research of cross-platform implementations of stream symmetric ciphers” Radioengineering, № 193. – pp. 94–106, 2014.

Patrik Ekdahl, Thomas Johansson, Alexander Maximov, Jing Yang, A new SNOW stream cipher called SNOW-V, IACR Trans Symmetric Cryptol 2019 (3) (2019) 1–42, 10.13154/tosc.v2019.i3.1-42.

Information Technology. Cryptographic protection of information. Algorithm of symmetric flow transformation. DSTU 8845:2019, 2019.

Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A. and Uhsadel, L., “A survey of lightweight-cryptography implementations” IEEE Design & Test of Computers, 24(6), pp. 522-533, 2007

Rinne S., Eisen-barth T., Paar C. “Performance Analysis of Contemporary Light-Weight Block Ciphers on 8-bit Microcontrollers” ECRYPT Workshop Software Perfor-mance Enhancement for Encryption and Decryption, pp. 33-43, 2007.

W. Diehl, F. Farahmand, P. Yalla, J. -P. Kaps and K. Gaj, "Comparison of hardware and software implementations of selected lightweight block ciphers," 2017 27th International Conference on Field Programmable Logic and Applications (FPL), Ghent, Belgium, 2017, pp. 1-4, doi: 10.23919/FPL.2017.8056808.

Mohammed El-Hajj, Ahmad Fadlallah, "Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms", 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), pp.121-126, 2022.

Downloads


Abstract views: 114

Published

2023-06-30

Issue

Section

Articles

How to Cite

[1]
O. Krulikovskyi, S. Haliuk, I. Safronov, and I. Gorbenko, “Ukrainian National Encryption Standards for FPGA Based Embedded Systems”, SISIOT, vol. 1, no. 1, p. 01005, Jun. 2023, doi: 10.31861/sisiot2023.1.01005.

Similar Articles

1-10 of 28

You may also start an advanced similarity search for this article.