Dynamic and Secure Substitution Box for Efficient Speech Encryption Engine
Keywords:
FPGA, S-box, speech encryption, cryptanalysis, dynamicAbstract
The Dynamic and Secure Substitution Box (DS2B) design suitable for IoT and resource-constrained platforms for efficient encryption. The DS2B has the advantages of simple structure and good encryption performance. A different number of strong S-boxes could be generated with minor variations in the DS2B parameters. Performance analyses of the DS2B, including differential/linear cryptanalysis, bijective, nonlinearity, strict avalanche criterion (SAC), and bit independence criterion (BIC) have been presented where high nonlinearity, and low differential uniformity are achieved. Besides, a comparison with recent S-boxes is introduced which shows the robustness of the DS2B. To maximize the throughput rate LUT based S box is replaced with dynamic composite S box with associated pipelining technique. Here flip flop-based masking is carried out inside S box module to achieve maximum level of transformation for securing the cipher key and adding resistance to any scan-based attacks. In this paper, security enhancement and high-speed solutions are provided without affecting the quality of the proposed core. Performance of proposed method is tested with key generation module and the simulation results proves the performance efficiency and hardware synthesis will prove the other metrics like high throughput rate and complexity overhead using Xilinx VIVADO tool.
References
- W. Yu and S. Köse, ‘‘A lightweight masked AES implementation for securing Iot against CPA attacks,’’ IEEE Trans. Circuits Syst. I, Reg. Papers, vol. 64, no. 11, pp. 2934–2944, Nov. 2017.
- M. Alhawari, D. Kilani, B. Mohammad, H. Saleh, and M. Ismail, ‘‘An efficient thermal energy harvesting and power management for µwatt wearable biochips,’’ in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), May 2016, pp. 2258–2261.
- M. Alhawari, T. Tekeste, B. Mohammad, H. Saleh, and M. Ismail, ‘‘Power management unit for multi-source energy harvesting in wearable electronics,’’ in Proc. IEEE 59th Int. Midwest Symp. Circuits Syst. (MWSCAS), Oct. 2016, pp. 1–4.
- S. Mathew, S. Satpathy, V. Suresh, M. Anders, H. Kaul, A. Agarwal, S. Hsu, G. Chen, and R. Krishnamurthy, ‘‘340 mV–1.1 V, 289 Gbps/W, 2090-gate nanoAES hardware accelerator with area-optimized encrypt/decrypt GF(2 4) 2 polynomials in 22 nm tri-gate CMOS,’’ IEEE J. Solid-State Circuits, vol. 50, no. 4, pp. 1048–1058, Apr. 2015.
- G. Bansod, N. Raval, and N. Pisharoty, ‘‘Implementation of a new lightweight encryption design for embedded security,’’ IEEE Trans. Inf. Forensics Security, vol. 10, no. 1, pp. 142–151, Jan. 2015.
- D.-H. Bui, ‘‘An innovative lightweight cryptography system for Internetof-Things ULP applications,’’ Ph.D. dissertation, Dept. Micro Nanotechnol./Microelectron., Hanoi Nat. Univ., Hanoi, Vietnam, Univ. Grenoble Alpes, Grenoble, France, 2019. [Online]. Available: https://tel.archivesouvertes.fr/tel-02295267/
- F. Özkaynak, V. Çelik, and A. B. Özer, ‘‘A new S-box construction method based on the fractional-order chaotic Chen system,’’ Signal, Image Video Process., vol. 11, no. 4, pp. 659–664, May 2017.
- A. H. Zahid, E. Al-Solami, and M. Ahmad, ‘‘A novel modular approach based substitution-box design for image encryption,’’ IEEE Access, vol. 8, pp. 150326–150340, 2020.
- E. A. Solami, M. Ahmad, C. Volos, M. Doja, and M. Beg, ‘‘A new hyperchaotic system-based design for efficient bijective substitution-boxes,’’ Entropy, vol. 20, no. 7, p. 525, Jul. 2018.
- S. N. George, N. Augustine, and D. P. Pattathil, ‘‘Audio security through compressive sampling and cellular automata,’’ Multimedia Tools Appl., vol. 74, no. 23, pp. 10393–10417, Dec. 2015.
- A. Alghafis, N. Munir, and M. Khan, ‘‘An encryption scheme based on chaotic Rabinovich-Fabrikant system and S8 confusion component,’’ Multimedia Tools Appl., vol. 80, no. 5, pp. 7967–7985, Feb. 2021.
- Q. Zhang, Y. Li, Y. Hu, and X. Zhao, ‘‘An encrypted speech retrieval method based on deep perceptual hashing and CNN-BiLSTM,’’ IEEE Access, vol. 8, pp. 148556–148569, 2020.
- M. F. Tolba, W. S. Sayed, M. E. Fouda, H. Saleh, M. Al-Qutayri, B. Mohammad, and A. G. Radwan, ‘‘Digital emulation of a versatile memristor with speech encryption application,’’ IEEE Access, vol. 7, pp. 174280–174297, 2019.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRST

This work is licensed under a Creative Commons Attribution 4.0 International License.