-
FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7
Authors:
Ridha Ghayoula,
Jaouhar Fattahi,
Amor Smida,
Issam El Gmati,
Emil Pricop,
Marwa Ziadia
Abstract:
FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implemen…
▽ More
FPGA is a hardware architecture based on a matrix of programmable and configurable logic circuits thanks to which a large number of functionalities inside the device can be modified using a hardware description language. These functionalities must often be secured especially when the context is sensitive (military, banking, medical, legal, etc.). In this paper, we put forward an efficient implementation of SIMON's block cipher algorithm using Xilinx Vivado 2018.2. The proposed design is analyzed through simulation on Xilinx Artix-7. A prototype of our design is implemented using the xc7a35tcsg324-1 FPGA chip. Performance and results are discussed.
△ Less
Submitted 4 January, 2023;
originally announced January 2023.
-
Witness-Functions versus Interpretation-Functions for Secrecy in Cryptographic Protocols: What to Choose?
Authors:
Jaouhar Fattahi,
Mohamed Mejri,
Marwa Ziadia,
Takwa Omrani,
Emil Pricop
Abstract:
Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The f…
▽ More
Proving that a cryptographic protocol is correct for secrecy is a hard task. One of the strongest strategies to reach this goal is to show that it is increasing, which means that the security level of every single atomic message exchanged in the protocol, safely evaluated, never deceases. Recently, two families of functions have been proposed to measure the security level of atomic messages. The first one is the family of interpretation-functions. The second is the family of witness-functions. In this paper, we show that the witness-functions are more efficient than interpretation-functions. We give a detailed analysis of an ad-hoc protocol on which the witness-functions succeed in proving its correctness for secrecy while the interpretation-functions fail to do so.
△ Less
Submitted 27 July, 2017;
originally announced July 2017.
-
Cryptographic Protocol for Multipart Missions Involving Two Independent and Distributed Decision Levels in a Military Context
Authors:
Jaouhar Fattahi,
Mohamed Mejri,
Marwa Ziadia,
Ouejdene Samoud,
Elies Ghayoula,
Emil Pricop
Abstract:
In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the…
▽ More
In several critical military missions, more than one decision level are involved. These decision levels are often independent and distributed, and sensitive pieces of information making up the military mission must be kept hidden from one level to another even if all of the decision levels cooperate to accomplish the same task. Usually, a mission is negotiated through insecure networks such as the Internet using cryptographic protocols. In such protocols, few security properties have to be ensured. However, designing a secure cryptographic protocol that ensures several properties at once is a very challenging task. In this paper, we propose a new secure protocol for multipart military missions that involve two independent and distributed decision levels having different security levels. We show that it ensures the secrecy, authentication, and non-repudiation properties. In addition, we show that it resists against man-in-the-middle attacks.
△ Less
Submitted 27 July, 2017; v1 submitted 24 July, 2017;
originally announced July 2017.