Subhadeep Banik
Technical University of Denmark
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Subhadeep Banik.
international conference on selected areas in cryptography | 2015
Subhadeep Banik; Andrey Bogdanov; Francesco Regazzoni
In the last few years, the field of lightweight cryptography has seen an influx in the number of block ciphers and hash functions being proposed. One of the metrics that define a good lightweight design is the energy consumed per unit operation of the algorithm. For block ciphers, this operation is the encryption of one plaintext. By studying the energy consumption model of a CMOS gate, we arrive at the conclusion that the energy consumed per cycle during the encryption operation of an r-round unrolled architecture of any block cipher is a quadratic function in r. We then apply our model to 9 well known lightweight block ciphers, and thereby try to predict the optimal value of r at which an r-round unrolled architecture for a cipher is likely to be most energy efficient. We also try to relate our results to some physical design parameters like the signal delay across a round and algorithmic parameters like the number of rounds taken to achieve full diffusion of a difference in the plaintext/key.
international conference on progress in cryptology | 2015
Subhadeep Banik
Sprout is a lightweight stream cipher proposed by Armknecht and Mikhalev at FSE 2015. It has a Grain-like structure with two state Registers of size 40 bits each, which is exactly half the state size of Grain v1. In spite of this, the cipher does not appear to lose in security against generic Time-Memory-Data Tradeoff attacks due to the novelty of its design. In this paper, we first present improved results on Key Recovery with partial knowledge of the internal state. We show that if 50 of the 80 bits of the internal state are guessed then the remaining bits along with the secret key can be found in a reasonable time using a SAT solver. Thereafter, we show that it is possible to perform a distinguishing attack on the full Sprout stream cipher in the multiple IV setting using around
cryptographic hardware and embedded systems | 2017
Subhadeep Banik; Sumit Kumar Pandey; Thomas Peyrin; Yu Sasaki; Siang Meng Sim; Yosuke Todo
hardware oriented security and trust | 2016
Subhadeep Banik; Andrey Bogdanov; Francesco Regazzoni; Takanori Isobe; Harunaga Hiwatari; Toru Akishita
2^{40}
fast software encryption | 2016
Subhadeep Banik; Takanori Isobe
applied cryptography and network security | 2017
Ralph Ankele; Subhadeep Banik; Avik Chakraborti; Eik List; Florian Mendel; Siang Meng Sim; Gaoli Wang
240 randomly chosen IVs on an average. The attack requires around
international conference on cryptology in india | 2016
Sonu Jha; Subhadeep Banik; Takanori Isobe; Toshihiro Ohigashi
international workshop on security | 2015
Subhadeep Banik; Sonu Jha
2^{48}
international conference on progress in cryptology | 2015
Subhadeep Banik; Andrey Bogdanov
Security and Communication Networks | 2015
Subhadeep Banik; Sonu Jha
248 bits of memory. Thereafter, we will show that for every secret key, there exist around