scispace - formally typeset
Search or ask a question

Showing papers on "CLEFIA published in 2018"


Journal ArticleDOI
TL;DR: The presented signature-based schemes in this paper are general and can be applied to block ciphers with 8-bit S-boxes, such as Camellia, SMS4, the advanced encryption standard, and CLEFIA.
Abstract: In secure cryptographic primitives, such as block ciphers, the reliability of hardware implementations needs to be closely considered because faults in the hardware implementations can potentially reduce or impact on the underlying security. In this paper, we present approaches to detect errors in hardware implementations of the inversion in GF(28). The proposed approaches are based on both nonredundant and redundant arithmetic, utilizing normal basis (nonredundant) and two redundant Galois field representations, i.e., polynomial ring representation and redundantly represented basis through tower fields. To the best of our knowledge, this is the first work focusing on the error detection architectures for redundant arithmetic-based inversion in GF(28). The presented signature-based schemes in this paper are general and can be applied to block ciphers with 8-bit S-boxes, such as Camellia, SMS4, the advanced encryption standard, and CLEFIA. We present the results of error simulations and application-specific integrated circuit implementations to demonstrate the utility of the presented schemes. Based on the specific implementation’s security/reliability objectives and the overhead/degradation tolerance for implementation/performance metrics, one can fine-tune and tailor the proposed work to achieve more reliable inversions in GF(28).

14 citations


Proceedings ArticleDOI
01 Feb 2018
TL;DR: In proposed effort, this work is using CLEFIA to encrypt images, and in second part it is used to decrypt images and in third part, it is using error rectification and recognition technique using Low Density Parity Check convention.
Abstract: In contemporary planet we are distributing lot of particulars through electronic media. In innumerable fields this information should be protected. Few examples in which the particular should be protected are military, industries, scientific research etc. In proposed effort we encompass three parts. In first part, we are using CLEFIA to encrypt images, and in second part we are using CLEFIA to decrypt images and in third part we are using error rectification and recognition technique using Low Density Parity Check convention. CLEFIA is the block cipher algorithm. The block size of CLEFIA is 16 bytes and the key size is 16 bytes, 24 bytes and 32 bytes. After Encryption of images using CLEFIA the images will be sent to the recipient in the form of binary bits. While transmitting these binary bits through communication channel, particulars may get distressed due to noise and to tenacity; Low Density Parity Check Convention is used in the receiver side.