SCENERY: a lightweight block cipher based on Feistel structure

Jingya FENG, Lang LI

PDF(2691 KB)
PDF(2691 KB)
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (3) : 163813. DOI: 10.1007/s11704-020-0115-9
RESEARCH ARTICLE

SCENERY: a lightweight block cipher based on Feistel structure

Author information +
History +

Abstract

In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software platforms. SCENERY is a 64-bit block cipher supporting 80-bit keys, and its data processing consists of 28 rounds. The round function of SCENERY consists of 8 4 × 4 S-boxes in parallel and a 32 × 32 binary matrix, and we can implement SCENERY with some basic logic instructions. The hardware implementation of SCENERY only requires 1438 GE based on 0.18 um CMOS technology, and the software implementation of encrypting or decrypting a block takes approximately 1516 clock cycles on 8-bit microcontrollers and 364 clock cycles on 64-bit processors. Compared with other encryption algorithms, the performance of SCENERY is well balanced for both hardware and software. By the security analyses, SCENERY can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related-key attacks.

Graphical abstract

Keywords

lightweight block cipher / feistel structure / cryptanalysis / internet of things

Cite this article

Download citation ▾
Jingya FENG, Lang LI. SCENERY: a lightweight block cipher based on Feistel structure. Front. Comput. Sci., 2022, 16(3): 163813 https://doi.org/10.1007/s11704-020-0115-9

References

[1]
Li L , Liu B , Zhou Y , Zou Y . SFN: A new lightweight block cipher. Journal of Microprocessors Microsyst, 2018, 60 : 138– 150
[2]
Zhang W , Bao Z , Lin D , Rijmen V , Yang B , Ingrid V . RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. Journal of Science China (Information Sciences), 2015, 58( 12): 89– 103
[3]
Beaulieu R , Shors D , Smith J , Treatman-Clark S , Weeks B , Wingers L . The Simon And Speck Families of Lightweight Block Ciphers. Journal of IACR Cryptol. Eprint Arch, 2013, 2013 : 404– 449
[4]
Banik S, Pandey S K, Peyrin T, Sasaki Y, Sim S M, Todo Y. GIFT: A small present. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2017, 321−345
[5]
Kobayashi E, Suzaki T, Minematsu K, Morioka S. TWINE: A lightweight block cipher for multiple platforms. In: Proceedings of the conference on Selected Areas in Cryptography. 2012, 339−354
[6]
Wu W, Zhang L. LBlock: A lightweight block cipher. In: Proceedings of International Conference on Applied Cryptography and Network Security. 2011, 327−344
[7]
Gong Z, Nikova S, Law Y W. KLEIN: A new family of lightweight block ciphers. In: Proceedings of Workshop on RFID Security. 2011, 1−18
[8]
Bogdanov A, Knudsen L R, Leander G, Paar C, Poschmann A, Robshaw M J B, Seurin Y, Vikkelsoe C. PRESENT: An ultra lightweight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2007, 450−466
[9]
Biham E. A fast new DES implementation in software. In: Proceedings of International Workshop on Fast Software Encryption. 1997, 260−270
[10]
Saberi I, Shojaie B, Salleh M, Enhanced Key Expansion for AES-256 by using Even-Odd method. In: Proceedings of International Conference on Research and Innovation in Information Systems. 2011, 1−5
[11]
Kam J B , Davida G I . Structured Design of Substitution-Permutation Encryption Networks. Journal of IEEE Transactions on Computers, 1979, C-28( 10): 747– 753
[12]
Feistel H . Cryptography and Computer Privacy. Journal of Scientific American - SCI AMER, 1973, 228( 5): 15– 23
[13]
Webster A F, Tavares S E, On the Design of S-Boxes. In: Proceedings of Lecture notes in computer sciences; 218 on Advances in cryptology—CRYPTO 85. 1986, 523−534
[14]
Motara Y M, Irwin B. SHA-1 and the Strict Avalanche Criterion. In: Proceedings of Information Security for South Africa Conference. 2016, 35−40
[15]
Knudsen L R. Practically secure Feistel ciphers. In: Proceedings of International Workshop on Fast Software Encryption. 1993, 211−221
[16]
Mouha N, Wang Q, Gu D, Preneel B. Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. In: Proceedings of International Conference on Information Security and Cryptology. 2011, 57−76
[17]
Sun S, Hu L, Wang P, Qiao K, Ma X, Song L. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2014, 158−178
[18]
Liu B T , Li L , Wu R X , Xie M M , Li Q P . Loong: A family of Involutional lightweight Block Cipher Based on SPN Structure. Journal of IEEE Access, 2019, 7 : 136023– 136035
[19]
Sasaki Y, Todo Y. New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Technique. 2017, 185−215
[20]
Biham E . New Types of Cryptanalytic Attacks Using Related Keys. Journal of Cryptology, 1994, 7( 4): 229– 246
[21]
Biryukov A, Wagner D. Slide Attacks. In: Proceedings of International Workshop on Fast Software Encryption. 1999, 245−259
[22]
Guo J, Peyrin T, Poschmann A, Robshaw M. The LED block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2011, 326−341
[23]
Beaulieu R , Shors D , Smith J , Treatman-Clark S , Weeks B , Wingers L . SIMON and SPECK: Block Ciphers for the Internet of Things. Journal of IACR Cryptology ePrint Archive. 2015, 2015, 585– 599
[24]
Beierle C, Jean J, Kölbl S, Leander G, Moradi A, Peyrin, T, Sasaki Y, Sasdrich P, Sim S M. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. In: Proceedings of Annual International Cryptology Conference. 2016, 123−153
[25]
Dinu D, Biryukov A, Großschädl J, Khovratovich D, Corre Y L, Perrin L P. FELICS–Fair Evaluation of Lightweight Cryptographic Systems. In: Proceedings of NIST Workshop on Lightweight Cryptography, 2015
[26]
Luo P , Zhang W , Bao Z . The Implementation and Optimization of Lightweight Block Cipher RECTANGLE based on FELICS. Journal of Cyber Security, 2017, 2( 3): 36– 47

Acknowledgements

This research was supported by the Scientific Research Fund of Hunan Provincial Education Department (19A072), Application-oriented Special Disciplines, Double First-Class University Project of Hunan Province (Xiangjiaotong [2018] 469), the Science and Technology Plan Project of Hunan Province (2016TP1020).

RIGHTS & PERMISSIONS

2022 Higher Education Press
AI Summary AI Mindmap
PDF(2691 KB)

Accesses

Citations

Detail

Sections
Recommended

/