SCENERY: a lightweight block cipher based on Feistel structure
Jingya FENG , Lang LI
Front. Comput. Sci. ›› 2022, Vol. 16 ›› Issue (3) : 163813
SCENERY: a lightweight block cipher based on Feistel structure
In this paper, we propose a new lightweight block cipher called SCENERY. The main purpose of SCENERY design applies to hardware and software platforms. SCENERY is a 64-bit block cipher supporting 80-bit keys, and its data processing consists of 28 rounds. The round function of SCENERY consists of 8 4 × 4 S-boxes in parallel and a 32 × 32 binary matrix, and we can implement SCENERY with some basic logic instructions. The hardware implementation of SCENERY only requires 1438 GE based on 0.18 um CMOS technology, and the software implementation of encrypting or decrypting a block takes approximately 1516 clock cycles on 8-bit microcontrollers and 364 clock cycles on 64-bit processors. Compared with other encryption algorithms, the performance of SCENERY is well balanced for both hardware and software. By the security analyses, SCENERY can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis and related-key attacks.
lightweight block cipher / feistel structure / cryptanalysis / internet of things
| [1] |
|
| [2] |
|
| [3] |
|
| [4] |
Banik S, Pandey S K, Peyrin T, Sasaki Y, Sim S M, Todo Y. GIFT: A small present. In: Proceedings of International Conference on Cryptographic Hardware and Embedded Systems. 2017, 321−345 |
| [5] |
Kobayashi E, Suzaki T, Minematsu K, Morioka S. TWINE: A lightweight block cipher for multiple platforms. In: Proceedings of the conference on Selected Areas in Cryptography. 2012, 339−354 |
| [6] |
Wu W, Zhang L. LBlock: A lightweight block cipher. In: Proceedings of International Conference on Applied Cryptography and Network Security. 2011, 327−344 |
| [7] |
Gong Z, Nikova S, Law Y W. KLEIN: A new family of lightweight block ciphers. In: Proceedings of Workshop on RFID Security. 2011, 1−18 |
| [8] |
Bogdanov A, Knudsen L R, Leander G, Paar C, Poschmann A, Robshaw M J B, Seurin Y, Vikkelsoe C. PRESENT: An ultra lightweight block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2007, 450−466 |
| [9] |
Biham E. A fast new DES implementation in software. In: Proceedings of International Workshop on Fast Software Encryption. 1997, 260−270 |
| [10] |
Saberi I, Shojaie B, Salleh M, Enhanced Key Expansion for AES-256 by using Even-Odd method. In: Proceedings of International Conference on Research and Innovation in Information Systems. 2011, 1−5 |
| [11] |
|
| [12] |
|
| [13] |
Webster A F, Tavares S E, On the Design of S-Boxes. In: Proceedings of Lecture notes in computer sciences; 218 on Advances in cryptology—CRYPTO 85. 1986, 523−534 |
| [14] |
Motara Y M, Irwin B. SHA-1 and the Strict Avalanche Criterion. In: Proceedings of Information Security for South Africa Conference. 2016, 35−40 |
| [15] |
Knudsen L R. Practically secure Feistel ciphers. In: Proceedings of International Workshop on Fast Software Encryption. 1993, 211−221 |
| [16] |
Mouha N, Wang Q, Gu D, Preneel B. Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. In: Proceedings of International Conference on Information Security and Cryptology. 2011, 57−76 |
| [17] |
Sun S, Hu L, Wang P, Qiao K, Ma X, Song L. Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-oriented Block Ciphers. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. 2014, 158−178 |
| [18] |
|
| [19] |
Sasaki Y, Todo Y. New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Technique. 2017, 185−215 |
| [20] |
|
| [21] |
Biryukov A, Wagner D. Slide Attacks. In: Proceedings of International Workshop on Fast Software Encryption. 1999, 245−259 |
| [22] |
Guo J, Peyrin T, Poschmann A, Robshaw M. The LED block cipher. In: Proceedings of International Workshop on Cryptographic Hardware and Embedded Systems. 2011, 326−341 |
| [23] |
|
| [24] |
Beierle C, Jean J, Kölbl S, Leander G, Moradi A, Peyrin, T, Sasaki Y, Sasdrich P, Sim S M. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. In: Proceedings of Annual International Cryptology Conference. 2016, 123−153 |
| [25] |
Dinu D, Biryukov A, Großschädl J, Khovratovich D, Corre Y L, Perrin L P. FELICS–Fair Evaluation of Lightweight Cryptographic Systems. In: Proceedings of NIST Workshop on Lightweight Cryptography, 2015 |
| [26] |
|
Higher Education Press
/
| 〈 |
|
〉 |