Ojcsv03i01p83 88
Ojcsv03i01p83 88
Department of Computer Science and Engineering, Einstein College of Engineering, Tirunelveli, (India).
Department of IT, National Engineering College, Kovilpatti, (India).
ABSTRACT
In November 2001 NIST published Rijndael as the proposed algorithm for AES(Advanced
Encryption Standard). The result of new attack methods shows that there may be some missing part in
the design of S-box and key schedule with AES algorithm. The problem is the weakness of linearity
existing in the S-box and key schedule. In order to keep away from the new attacks and implement the
AES in software and hardware provides higher level of security and faster encryption speed; we analyze
in detail the AES algorithm and propose a new implementation scheme for increasing complexity of
nonlinear transformation in design of S-box. Implementation scheme with Java and the use of
reconfigurable coprocessor as a cryptography hardware is proposed.
· SubBytes Transformation: Uses an S-box form Square. The original Square attack can break
to perform a byte-by-byte substitution of the round-reduced variants of Rijndael up to 6 or 7
block. rounds (i.e. AES-128 and AES-192) faster than an
· Shift rows: A simple permutation. exhaustive key search .
· Mix columns: A substitution. (2) Weakness of the existing S-box and key
· Add round key: A simple bitwise XOR of the schedule
current block with a portion of the expanded S-box is only one component to implement
key. nonlinear transformation in the AES. The
cryptographic strength of the AES depends strongly
In the Rijndael algorithm, all steps are on the choice of S-box. Many cryptographists have
invertible. The decryption is shown in Figure 2. It is discovered that there are some weaknesses in the
classified in to the straightforward decryption design of the existing S-box. For example, Y. B. Wang
algorithm and the equivalent decryption algorithm. proved that the S-box has the properties of short
For SubBytes transformation, ShiftRows periods and bad distribution, which may be a fatal
transformation, MixColumns transformation and weakness for AES. The new way of equivalent
AddRoundKey addition, an inverse function is used generating the S-box was found by Y. A. Zhang and
in the decryption algorithm. Decryption algorithm D. G. Feng . It may be a great help to the algebraic
make use of the expanded key in the reverse order. attack. In order to make up the weakness of the
existing S-box and improve the nonlinearity of S-
The Problem of Aes Security box, W. Millan proposed to use the iterated hill
Rijndael has been designed to have very climbing be used for self-inverse S-box[15] . J. M.
strong resistance against the classical Liu, etc thought that the algebraic expression of AES
approximation attacks, such as linear cryptanalysis, S-box is very simple and fewer terms are involved
differential cryptanalysis etc. However since Rijndael [16]. They proposed to adopt a new algebraic
is derived form Square algorithm, and is very method to design the S-box. In comparison with
algebraic, new algebraic and improved differential the cipher itself, the Rijndael key schedule appears
attacks have appeared. to be more of a linear design. It has a much slower
diffusion structure than the cipher, and contains
(1) Strength against Known Attacks relatively few nonlinear elements. It can almost be
The AES specifies three key sizes, 128, described as a collection of 32 linear feedback shift
192 and 256 bits. Their number of possible keys is registers LFSRs, working in parallel. This implies
3.4 x 1038, 6.2 x 1057, and 1.1 x 1077, respectively. that for related keys, i.e., pairs of unknown keys
In comparison, DES keys are 56 bits long, which with known differences, one can in part predict the
means there are approximately 7.2 x 1016 possible differences of the individual round keys.
DES keys. Thus, there are on the order of 1021
times more AES 128-bit keys than DES 56-bit keys. Proposed Methodology
AES with 128-bit keys has stronger resistance to i) Software
an exhaustive key search than DES. Although In order to reduce the cost of
classic differential and linear attacks are invalid for implementation, we adopt the method of software
the AES, they have been extended in several ways to implement AES algorithm. In addition, Java is an
for recent years and new attacks have been object oriented programming language with many
published that are relative to them. The newest interesting security features (e.g. sandbox
attack combined boomerang and the rectangle paradigm, byte code verification) [17]. Hence, it is
attack with related-key differentials uses the proposed to implement AES in Java. Apart from its
weaknesses of few nonlinear transformations in the security, the efficiency of AES is of main interest
key schedule algorithm of ciphers, and can break for application developers. In this scheme, the
some reduced-round versions of AES. For example, speeds of data encryption and decryption are
it can break 192-bit 9-round AES by using 256 selected as the performance indices to evaluate the
different related keys. The Square attack is also valid efficiency of AES. The speed of data encryption is
for Rijndael, as Rijndael inherits many properties defined as the quotient obtained by dividing the bit
Velayutham & Manimegalai, Orient. J. Comp. Sci. & Technol., Vol. 3(1), 83-88 (2010) 85
Fig. 2 Decryption
Scheme:
Although efficiency of hardware control signals, and handling of crossing data needs
implementation was one of the evaluation criteria to be developed. Second, debugging and simulating
for choosing AES, only few hardware designs are the coprocessor design should suppor t the
presented for FPGA or ASIC platforms [9]. Analysis combination of software and hardware. Lastly,
of routing was not mentioned in most papers. For limited speed of the bus, connecting CPU and FPGA
FPGA target, routing placement is predetermined should be efficiently utilized. Designer should avoid
within the FPGA architecture and this is the cause degrading the overall system’s performance by
for greater area in FPGAs compared to ASIC analyzing these parameters. Speed of the bus is
designs. On contrary, area of ASIC designs would the major bottleneck imposed on coprocessor
be greatly affected by routing overhead, where the systems. This is similar to the memory gap between
minimum bus length is 128 bit. ASIC’s floorplan in processor and memory in the PC industry. For
[9] reports that the area estimations of routing were dividing the AES system, one idea would be to allow
off by a factor of two. Previous experience with layout the processor to compute shift operation and assign
CAD tools helped me to realize the complexity of rest to the FPGA.
routing problems and its effect on chip area. In order
to achieve optimized ASIC hardware design of AES, CPU - ShiftRow and Control
efficient routing algorithm is mandatory. FPGA - SubByte, MixColumn, and KeyAddition
Shift operations in hardware represent
FPGA Coprocessor mere wiring. Moving this function may benefit the
Previous sections examined stand alone hardware implementation due to reduced amount
AES hardware implementations. Following section of wire interconnects. In other words, decreased
describes the design which supports a coprocessor. wire parasitic and smaller routing overhead.
Organization of this architecture consists of a CPU Moreover, most of the AES function would operate
with an aid of a FPGA coprocessor. Coprocessor on the FPGA and thus minimal communication
design integrates software and hardware into a occurs between the CPU and the FPGA.
single system, along with the reconfigurable
capability of FPGA. Generally, the CPU controls the Conlusion
overall system operations while FPGA is responsible AES is a new cryptographic algorithm that
for calculations involving extensive computations. can be used to protect electronic data. Its security
Moreover, FPGA is reconfigurable that can be has attracted cryptographist’s attentions. The
reprogrammed in few milliseconds. As an example, methods of new attacks welled that the design of
consider an embedded system with a coprocessor, existing S-box some weaknesses. The principal
connected over a network using an Ethernet. weakness is the problem of linearity in the S-box
Depending on different situations, the FPGA can and key schedule. It is necessary to improve
be reprogrammed dynamically according to the real- nonlinear transformations in the design of S-box
time status [11]. This allows FPGA to dynamically and key schedule in order to protect from new
adjust to satisfy its surrounding requests. attacks. Some measures against new attacks were
adopted by improving the complexity of nonlinear
Hardware platform that was researched is transformation of S-box in the proposed
an embedded system by Wind River. The physical implementation scheme such that it increases the
setup of this board includes an IBM PowerPC and security. To increase the data encryption and
Xilinx FPGA daughter card connected through a decryption time the implemented software design
custom peripheral bus [12]. Many issues arise for is embedded with FPGA. Such that the proposed
the mixed system. First, communication between work mix of software and hardware design
the processor and the FPGA must be managed. generates an acceptable speed of data encryption
Type of communication protocol, management of and decryption and also provides security.
88 Velayutham & Manimegalai, Orient. J. Comp. Sci. & Technol., Vol. 3(1), 83-88 (2010)
REFERENCES