Journal of Cryptology

, Volume 28, Issue 2, pp 240–256 | Cite as

Efficient Recursive Diffusion Layers for Block Ciphers and Hash Functions

  • Mahdi Sajadieh
  • Mohammad Dakhilalian
  • Hamid Mala
  • Pouyan Sepehrdad
Article

Abstract

Many modern block ciphers use maximum distance separable (MDS) matrices as the main part of their diffusion layers. In this paper, we propose a very efficient new class of diffusion layers constructed from several rounds of Feistel-like structures whose round functions are linear. We investigate the requirements of the underlying linear functions to achieve the maximal branch number for the proposed 4×4 words diffusion layer, which is an indication of the highest level of security with respect to linear and differential attacks. We try to extend our results for up to 8×8 words diffusion layers. The proposed diffusion layers only require simple operations such as word-level XORs, rotations, and they have simple inverses. They can replace the diffusion layer of several block ciphers and hash functions in the literature to increase their security, and performance. Furthermore, it can be deployed in the design of new efficient lightweight block ciphers and hash functions in future.

Key words

Block ciphers Diffusion layer Branch number MDS matrix 

References

  1. [1]
    D.J. Bernstein, The Salsa20 Stream Cipher (2005). http://www.ecrypt.eu.org/stream/salsa20p2.html
  2. [2]
    E. Biham, A. Shamir, Differential Cryptanalysis of DES-Like Cryptosystems, in CRYPTO’90. Lecture Notes in Computer Science, vol. 537 (Springer, Berlin, 1990), pp. 2–21 Google Scholar
  3. [3]
    J. Daemen, Cipher and Hash function design strategies based on linear and differential cryptanalysis. Ph.D. thesis, Elektrotechniek Katholieke Universiteit Leuven, Belgium (1995) Google Scholar
  4. [4]
    J. Daemen, V. Rijmen, The Design of Rijndael: AES—The Advanced Encryption Standard (Springer, Berlin, 2002) CrossRefGoogle Scholar
  5. [5]
    J. Guo, T. Peyrin, A. Poschmann, The PHOTON family of lightweight Hash functions, in CRYPTO’11. Lecture Notes in Computer Science, vol. 6841 (Springer, Berlin, 2011), pp. 222–239 Google Scholar
  6. [6]
    J. Guo, T. Peyrin, A. Poschmann, M. Robshaw, The LED block cipher, in CHES’11. Lecture Notes in Computer Science, vol. 6917 (Springer, Berlin, 2011), pp. 326–341 Google Scholar
  7. [7]
    S. Lin, D. Costello, Error control coding: fundamentals and applications (Prentice Hall, New York, 2004) Google Scholar
  8. [8]
    M. Matsui, Linear cryptanalysis method for DES cipher, in EUROCRYPT’93. Lecture Notes in Computer Science, vol. 765 (Springer, Berlin, 1993), pp. 386–397 Google Scholar
  9. [9]
    K. Ohkuma, H. Muratani, F. Sano, S. Kawamura, The block cipher hierocrypt, in SAC’01. Lecture Notes in Computer Science, vol. 2012 (Springer, Berlin, 2001), pp. 72–88 Google Scholar
  10. [10]
    M. Sajadieh, M. Dakhilalian, H. Mala, Perfect involutory diffusion layers based on invertibility of some linear functions. IET Inf. Secur. J. 5(1), 228–236 (2011) CrossRefGoogle Scholar
  11. [11]
    C. Schnorr, S. Vaudenay, Black box cryptoanalysis of Hash networks based on multipermutations, in EUROCRYPT’94. Lecture Notes in Computer Science, vol. 950 (Springer, Berlin, 1994), pp. 47–57 Google Scholar
  12. [12]
    S. Vaudenay, On the need for multipermutations: cryptanalysis of MD4 and SAFER, in FSE’94. Lecture Notes in Computer Science, vol. 1008 (Springer, Berlin, 1994), pp. 286–297 Google Scholar
  13. [13]
    M. Wang, J. Nakahara, Y. Sun, Cryptanalysis of the full MMB block cipher, in SAC’09. Lecture Notes in Computer Science, vol. 5867 (Springer, Berlin, 2009), pp. 231–248 Google Scholar
  14. [14]
    H. Wu, The Hash Function JH (2008). http://icsd.i2r.astar.edu.sg/staff/hongjun/jh/jh.pdf
  15. [15]
    G. Zeng, K. He, W. Han, A Trinomial Type of σ-LFSR Oriented Toward Software Implementation. Science in China Series F-Information Sciences, vol. 50 (Springer, Berlin, 2007), pp. 359–372 Google Scholar

Copyright information

© International Association for Cryptologic Research 2013

Authors and Affiliations

  • Mahdi Sajadieh
    • 1
  • Mohammad Dakhilalian
    • 2
  • Hamid Mala
    • 3
  • Pouyan Sepehrdad
    • 4
  1. 1.Department of Electrical EngineeringKhorasgan (Isfahan) Branch, Islamic Azad UniversityIsfahanIran
  2. 2.Department of Electrical and Computer EngineeringIsfahan University of TechnologyIsfahanIran
  3. 3.Department of Information Technology EngineeringUniversity of IsfahanIsfahanIran
  4. 4.EPFLLausanneSwitzerland

Personalised recommendations