answersLogoWhite

0


Best Answer

Scalable encryption algorithm uses only elementary operations commonly found in microcontrollers - addition, logical AND, OR and XOR, rotation and moves. Thus, implementation of the cipher is straighforward and small, while performance is good.

Similarly to the vast majority of modern blok ciphers, also SEA is a Feistel cipher, but with a simple structure and maybe unusually high number of rounds. As it is only a few months old, there seems to be no independent cryptoanalysis yet, but the authors analysed it for several modes of attack quite exhaustively.

An unusual feature of the cipher is, that it takes into account the native word length of the microcontroller, thus defines e.g. 8-bit, or 32-bit version of the cipher. This increases the ease of its implementation. Although the different word-length versions are mutually incompatible, in the most common scenario this is not a big drawback, as the typical counterpart of the microcontroller is a bigger system (e.g. a PC) with abundant resources, where optimum implementation is not necessary.

Another remarkable feature of the cipher is - as its name indicates - its scalability. It is not an unheard-of feature - for example, one of the requirements for AES was to have variants of the cipher with respect to both block length and key length. But SEA is designed so that it enables virtually any block and key length, provided that both are equal and multiple of 6 word lengths. Of course, in practice a limited set of word length and block/key length will be used, for example the authors compared 96-bit SEA on 8-bit microcontrollers and 192-bit SEA on 32-bit microcontrollers. However, as requirements on key length increase yearly due to advancing technology used (potentially) for brute-force attacks, SEA offers a quick and easy upgrade path.

A minor - but handy - peculiarity of SEA is, that after performing the whole key schedule (i.e. a complete encryption or decryption cycle), the key returns to its initial state. It means that the key does not require any extra memory - it can be stored in the place where it is used.

While attempting to implement the cipher on two popular 8-bit platforms - x51 and AVR, the rather mathematically-oriented notation used by the authors caused confusion in several cases. For example, in the substitution, the "recursivity" means, that in the three consecutive steps the already modified values obtained in the previous steps are used, rather than the original value of the data/key. An another maybe confusing thing is the notation of the rounding (the "half-finished" square bracket) which was due to poor print overlooked; while it is easy to describe the algorithm with no rounding altogether (as the number of rounds is by definition always odd).

The presented implementations are written in assembly language of the respective microcontroller and are optimized for speed, resulting in several times larger code than if the author's guideline was followed. The rationale behind this decision is, that even in this way the code size is well below 1 kbyte and in modern microcontrollers the code memory (usually FLASH) comes very cheap in multi-kilobyte chunks. Also, one-way process is given as the reference implementation (only encryption or only decryption - often only one of them is used in embedded applications), although the both-way version is presented, too, coming at a small penalty in size and some decrease in performance.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What is the difference between advanced encryption algorithm and scalable encryption algorithm?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What is scalable encryption algorithm?

this algorithm is initially made for small embedded applications like smart cards


What is an average number of iterations to sort 3 elements?

If you're only sorting 3 elements, it should take you 0 to 2 iterations. Of course, this answer might change if you're trying test out a scalable sorting algorithm.


What does Scalable DPI mean?

Scalable DPI is the ability to increase/decrease the resolution of a picture/text.


When was Scalable Vector Graphics created?

Scalable Vector Graphics was created on 2001-09-04.


What service does Imation provide to businesses and governments worldwide?

Imation is a data security and scalable storage company with various tiers of service available for businesses. They provide targeted solutions for issues such as data backup and recovery, data archives, data security, and hardware encryption for devices.


Difference Between Cloud Computing and SAAS?

Have you been wondering if there is a difference between cloud computing and SAAS, which stands for Software-as-a-Service? There definitely is a difference between the two terms. Cloud computing refers to the larger concept of using the Internet to access the network and services. Cloud computing is extremely scalable. SAAS differs in that it is software that is managed remotely by a provider on a subscription basis. SAAS is like cloud computing though because it is massively scalable.


How scalable is Unix?

Unix is designed to be extremely scalable; I've worked on systems with 12 or more processors, multiple clusters, etc.


Peer to peer networks are scalable?

yes


What is a characteristic of a scalable network?

easy expansion


What does SPARC stand for?

Scalable Processor ARChitecture


Why is the P2P application more scalable?

Its not a computer


What feature enable network devices to be scalable?

modularity