Lab 6: Simon Cipher

Lab 6: Simon Cipher
Slide Note
Embed
Share

Altius Minerals presents a unique investment opportunity with a discount to liquid NAV, no credit for developing royalties, and significant upside potential. The company's business model focuses on mineral exploration and royalty creation, offering stability, low debt, and impressive financials. With a diversified portfolio covering various minerals and projects, Altius emphasizes downside protection and capital structure efficiency. Explore how Altius Minerals stands out in the mining industry with a strategic approach backed by notable achievements and outlook.

  • Altius Minerals
  • Investment Opportunity
  • Discount
  • Upside Potential
  • Mineral Exploration

Uploaded on Feb 22, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Lab 6: Simon Cipher

  2. Secure Communication Encryption is the process of encoding a message, P, with a key, K, to obtain an undecipherable output C. ? ?,? ? The reverse of the process is decryption ? 1?,? ?

  3. Block Cipher Algorithm for encrypting blocks of data at a time message: a secret key 0x1918111009080100 0x6120736563726574 cipher: $ .S 0x24FC2E53 Block 0: 0x61207365 Block 1: 0x63726574 Block cipher 0xB9B8B3A8 Reference: Understanding Cryptography by Christof Paar and Jan Pelzl

  4. More Terms confusion relationship between plaintext and ciphertext is obscured [1]. diffusion influence of change in each bit of plaintext over the change of bits in the ciphertext [1]. 1101 1100 0110 1001 0101 1001 Block cipher 0011 0111 round a series of specific operations applied on a block of data. rounds can be chained to introduce more confusion and diffusion which makes the ciphertext harder to break. [1] Reference: Understanding Cryptography by Christof Paar and Jan Pelzl

  5. Simon Cipher Light weight block cipher developed by National Security Agency in 2013. Designed to be efficiently implemented in hardware. Several Configurations: Block Size 32 48 64 96 128 Key Size 64 72, 96 96,128 96,144 128,192,256 Reference: R. Beaulieu, et al., The SIMON and SPECK Families of Lightweight Block Ciphers. https://eprint.iacr.org/2013/404

  6. Lab 6 Simon Cipher (lite) Simon32/64 Encryption only 10 rounds instead of 32 Block size 32 bits Key size 64 bits Word size 16 bits

  7. Datapath

  8. Datapath

  9. Round Input: x, y tmp = x x = y xor (circular_shift_left(x,1) andcircular_shift_left(x,8)) xor circular_shift_left(x,2) xor round_key[i] y = tmp

  10. Round

  11. key test 0x1918111009080100 0x74657374 Round (0)

  12. key test 0x1918111009080100 Round (0) 0x7465 0x7374

  13. key test 0x1918111009080100 Round (0) 0x7465 0x7374 0xE8CA 0x6574 0xD195 0x7465

  14. key test 0x1918111009080100 Round (0) 0x7465 0x7374 0xE8CA 0x6040 0x6574 0x1334 0xD195 0x7465

  15. key test 0x1918111009080100 Round (0) 0x7465 0x7374 0xE8CA 0x6040 0x6574 0x1334 0xD195 0xC2A1 0x7465

  16. key test 0x1918111009080100 Round (0) 0x7465 0x7374 0xE8CA 0x6040 0x6574 0x1334 0xD195 0x0100 0xC2A1 Round_out(0) 0xC3A1 0x7465

  17. key test 0x1918111009080100 Round (1) 0xC3A1 0x7465

  18. Key expansion Each round needs a unique key. 0x1918111009080100 Round key is word size in width (16 bits) Round 0 0x0100 Round 1 0x0908 Round 2 0x1110 Round 3 0x1918 Round 4? Round N+4?

  19. Key expansion round_key[9] for i = 4 9 { tmp = circular_shift_right(round_key[i-1], 3) tmp = tmp xor round_key[i-3] tmp = tmp xor circular_shift_right(tmp, 1) round_key[i] = ~(round_key[i-4]) xor tmp xor z[i-4 mod 62] xor 3 }

  20. Key expansion

  21. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111

  22. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x1918 0x1110 0x0908 0x0100

  23. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x1918 0x1110 0x0908 0x0100 0xFEFF 0x0323

  24. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x1918 0x1110 0x0908 0x0100 0xFEFF 0x0323 0x0A2B

  25. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x1918 0x1110 0x0908 0x0100 0xFEFF 0x0323 0x0A2B 0x8515 0x8F3E 0x71C1

  26. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x1918 0x1110 0x0908 0x0100 0xFEFF 0x0323 0x0A2B 0x8515 0x8F3E 0x71C1 0x0001 Z(4-4) -> 1

  27. key Z Round key (4) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x1918 0x1110 0x0908 0x0100 0xFEFF 0x0323 0x0A2B 0x8515 0x8F3E 0x71C1 0x71C0 0x0001 Z(4-4) -> 1 0x71C3

  28. key Z Round key (5) 0x1918111009080100 011001110000110101 001000101111101100 111000011010100100 01011111 0x71C3 0x1918 0x1110 0x0908 Z(5-4) -> 1

  29. Simon Top Level

Related


More Related Content