TY - GEN
T1 - Encryption and reversible computations
T2 - 10th International Conference on Reversible Computation, RC 2018
AU - Táborský, Dominik
AU - Larsen, Ken Friis
AU - Thomsen, Michael Kirkedal
PY - 2018
Y1 - 2018
N2 - Encryption is a special case of conditional loss-less transformation and is, thus, interesting to study from the perspective of reversible computations. In this paper we investigate some of the advantages of implementing encryption algorithms in a reversible language; here exemplified by implementing several symmetric lightweight encryption algorithms in Janus. We not only get both encryption and decryption programs with the same implementation, but also demonstrate how to translate the Janus program to a Vale program, which is then intended to be used to formally show the absence of state information leakage. This shows a way to use reversible programming to increase resilience to some side-channel attacks and give prospects for writing more secure algorithms in the future. Our experience shows that the implementation time is not significantly increased when implementing the algorithms in Janus.
AB - Encryption is a special case of conditional loss-less transformation and is, thus, interesting to study from the perspective of reversible computations. In this paper we investigate some of the advantages of implementing encryption algorithms in a reversible language; here exemplified by implementing several symmetric lightweight encryption algorithms in Janus. We not only get both encryption and decryption programs with the same implementation, but also demonstrate how to translate the Janus program to a Vale program, which is then intended to be used to formally show the absence of state information leakage. This shows a way to use reversible programming to increase resilience to some side-channel attacks and give prospects for writing more secure algorithms in the future. Our experience shows that the implementation time is not significantly increased when implementing the algorithms in Janus.
KW - Encryption
KW - Information leakage
KW - Reversible computation
KW - Reversible programming
KW - Security
KW - Side-channel attacks
UR - http://www.scopus.com/inward/record.url?scp=85053505437&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-99498-7_23
DO - 10.1007/978-3-319-99498-7_23
M3 - Article in proceedings
AN - SCOPUS:85053505437
SN - 9783319994970
T3 - Lecture notes in computer science
SP - 331
EP - 338
BT - Reversible Computation
PB - Springer
Y2 - 12 September 2018 through 14 September 2018
ER -