Similarities between Encryption and Decryption: How far can we go?
Résumé
In this talk, I will investigate some approaches for reducing the hardware footprint of a block cipher for different constraints of the targeted applications. In this context, I will focus on the strategies which can be used for minimizing the overhead for decryption on top of encryption. These strategies include involutive ciphers and the construction used in PRINCE. In particular, I will discuss the potential weaknesses which might be introduced by this type of constructions.