QARMA


QARMA is a lightweight tweakable block cipher primarily known for its use in the ARMv8 architecture for protection of software as a cryptographic hash for the Pointer Authentication Code. The cipher was proposed by Roberto Avanzi in 2016. Two versions of QARMA are defined: QARMA-64 and QARMA-128. The design of the QARMA was influenced by PRINCE and MANTIS. The cipher is intended for fully-unrolled hardware implementations with low latency. Unlike the XTS mode, the address can be directly used as a tweak and does not need to be whitened with the block encryption first.

Architecture

QARMA is an Even–Mansour cipher using three stages, with whitening keys w0 and w1 XORed in between:
  1. permutation F is using core key k0 and parameterized by a tweak T. It has r rounds inside ;
  2. "central" permutation C is using key k1 and is designed to be reversible via a simple key transformation ;
  3. the third permutation is an inverse of the first.
All keys are derived from the master encryption key K using specialisation:
The data is split into 16 cells. Internal state also contains 16 cells, arranged in a 4x4 matrix, and is initialized by plaintext. In each round of, the state is transformed via operations :
  • is ShuffleCells, a MIDORI permutation of cells ;
  • is MixColumns: each column is multiplied by a fixed matrix M;
  • is SubCells: each cell is transformed using an S-box.
The tweak for each round is updated using :
  • is a cell permutation from MANTIS ;
  • is an LFSR applied to each of the cells with numbers . For QARMA-64, the LFSR is ⇒, for QARMA-128, ⇒,
The rounds of consist of inverse operations.
Central rounds, in addition to two rounds, include multiplication of the state by an involutary matrix Q.