The 128-bit Blockcipher CLEFIA
Taizo Shirai1, Kyoji Shibutani1, Toru Akishita1 Shiho Moriai1, Tetsu Iwata2
1 Sony Corporation 2 Nagoya University
The 128-bit Blockcipher CLEFIA Taizo Shirai 1 , Kyoji Shibutani 1 - - PowerPoint PPT Presentation
The 128-bit Blockcipher CLEFIA Taizo Shirai 1 , Kyoji Shibutani 1 , Toru Akishita 1 Shiho Moriai 1 , Tetsu Iwata 2 1 Sony Corporation 2 Nagoya University Direction for designing a new blockcipher Priority for Choosing an algorithm 1.
1 Sony Corporation 2 Nagoya University
Security Low cost Speed
Security Low cost Speed Algorithm X Algorithm Y
Software Oriented
Balanced (general-purpose)
Hardware Oriented
Streamciphers
F0 F1 F0 F1 F0 F1 F0 F1 F0 F1
: : : :
Bit Permutation
Reduced Data Processing Part
Bit Permutation Bit Permutation Bit Permutation Bit Permutation Bit Permutation Bit Permutation
RK2i RK2i+1
S0 S1 S0 S1 S0 S1 S0 S1
32 32 32 32
8 8 8 8 8 8 8 8
32 32
⎟ ⎟ ⎟ ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎜ ⎜ ⎜ ⎝ ⎛ 01 02 04 06 02 01 06 04 04 06 01 02 06 04 02 01 ⎟ ⎟ ⎟ ⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎜ ⎜ ⎜ ⎝ ⎛ 01 08 02 08 01 02 02 01 08 02 08 01 a a a a
F F F F F F F F + Better Diffusion
+Compact F-function Feistel Structure 4-branch type-II generalized Feistel Structure (GFN)
64 64 32 32 32 32
M1
Optimal Diffusion Mappings (MDS matrices) M1, M2
M2 M2 M1
concatenation M1 || M2 is also an optimal diffusion mapping
M1 M1
F F F F F F F F F F F F F F F F F F F F
Without DSM With DSM
F0 F0 F0 F0 F0 F1 F1 F1 F1 F1
: : : : : : : :
Minimum Requirement 128-bit key 192-bit key 256-bit key
128 4 . 131 30 38 . 4 2 128 76 . 130 28 67 . 4 2
38 . 4 max 67 . 4 max
> = × = > = × =
− −
LP DP
S-box : S0
CLEFIA employs 2 different 8-bit S-boxes
⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎝ ⎛ 1 2 2 1
(Whirlpool, FOX)
(AES, Camellia)
SS0 SS1 SS2 SS3
Inversion Over GF(28) g 8 8
All Const = 0
All Balance
Byte oriented saturation transition
38 . 4 max 67 . 4 max
2 2
− −
= = LP DP
6 max 6 max
2 2
− −
= = LP DP
⎟ ⎟ ⎠ ⎞ ⎜ ⎜ ⎝ ⎛ 1 2 2 1
Bit Permutation
Reduced-round Data Processing Part
Bit Permutation Bit Permutation Bit Permutation Bit Permutation Bit Permutation
RK0 ,..,RK3 RK4 ,..,RK7 RK8,..,RK11 RK12 ,..,RK15 RK16 ,..,RK19 RK20 ,..,RK23
:
Bit Permutation Bit Permutation Bit Permutation Bit Permutation Bit Permutation Bit Permutation
RK0 ,..,RK3 RK4 ,..,RK7 RK8,..,RK11 RK12 ,..,RK15 RK16 ,..,RK19 RK20 ,..,RK23
:
F F F F F F F F F F F0 F0 F0 F0 F0 F1 F1 F1 F1 F1
: : : :
12-round 4-branch GFN 28 diff. Active S-boxes A B C D D B C A “DoubleSwap” function
Bit Permutation Bit Permutation Bit Permutation Bit Permutation
RK0 ,..,RK7 RK8 ,..,RK15 RK16,..,RK31 RK32 ,..,RK47
:
F0 F0 F1 F1 F0 F0 F1 F1 F0 F0 F1 F1 F0 F0 F1 F1 F0 F0 F1 F1 F0 F0 F1 F1
: : : : : : :
10-round 8-branch GFN 29 diff. Active S-boxes
1. Differential Cryptanalysis 2. Linear Cryptanalysis 3. Differential-Linear Cryptanalysis 4. Boomerang Attack 5. Amplified Boomerang Attack 6. Rectangle Attack 7. Truncated Differential Cryptanalysis 8. Truncated Linear Cryptanalysis 9. Impossible Differential Cryptanalysis 10. Saturation Cryptanalysis 11. Higher Order Differential Cryptanalysis 12. Interpolation Cryptanalysis 13. XSL Attack 14. Chi-Square Cryptanalysis 15. Slide Attack 16. Related-Cipher Cryptanalysis 17. Related-Key Cryptanalysis 18. Related-Key Boomerang Cryptanalysis 19. Related-Key Rectangle Cryptanalysis 20. Collision Attack
[Data Processing Part]
10-round attack [Key Scheduling Part]
0.13 μm 0.13 μm 0.09 μm 0.13 μm 0.13 μm 0.09 μm Process Rule [20] [20] [20] [20] Ref
235 1,424 6,061 18 CLEFIA
Speed
202.5* 1,691 12,454 11 AES 75* 325 6,511 44 Camellia Camellia AES CLEFIA
Algorithm
971 311 677
Throughput [Mbps]
132* 10,993 22 85.5* 5,398 54 135 4,993 36
Compact
Efficiency * [Throughput / gate] Gate Size Cycle Type of Implementation
*The values of efficiency are adjusted by multiplying 1.5 by taking the difference of process into account