Revised Version of Block Cipher CHAM

被引:16
|
作者
Seo, Jae Hong [1 ]
Roh, Dongyoung [1 ]
Koo, Bonwook [1 ]
Jung, Younghoon [1 ]
Jeong, Il Woong [1 ]
Lee, Dong-Geon [1 ]
Kwon, Daesung [1 ]
Kim, Woo-Hwan [1 ]
机构
[1] Affiliated Inst ETRI, Daejeon, South Korea
关键词
Lightweight block cipher; CHAM; (Related-key) Differential cryptanalysis; SAT solver; DESIGN;
D O I
10.1007/978-3-030-40921-0_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CHAM is a family of lightweight block ciphers published in 2017 [22]. The CHAM family consists of three ciphers, CHAM-64/128, CHAM-128/128, and CHAM-128/256. CHAM can be implemented with a remarkably low area in hardware compared to other lightweight block ciphers, and it also performs well on software. We found new (related-key) differential characteristics and differentials of CHAM using a SAT solver. Although attacks using the new characteristics are limited to the reduced rounds of CHAM, it is preferable to increase the number of rounds to ensure a sufficient security margin. The numbers of rounds of CHAM-64/128, CHAM-128/128, and CHAM-128/256 are increased from 80 to 88, 80 to 112, and 96 to 120, respectively. We provide strong evidence that CHAM with these new numbers of rounds is secure enough against (related-key) differential cryptanalysis. Because increasing the number of rounds does not affect the area in low-area hardware implementations, the revised CHAM is still excellent in lightweight hardware implementations. In software, the revised CHAM is still comparable to SPECK, one of the top-ranked algorithms in software.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [31] Cryptanalysis of the Mercy block cipher
    Fluhrer, SR
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 28 - 36
  • [32] New block cipher: ARIA
    Kwon, D
    Kim, J
    Park, S
    Sung, SH
    Sohn, Y
    Song, JH
    Yeom, Y
    Yoon, EJ
    Lee, S
    Lee, J
    Chee, S
    Han, D
    Hong, J
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 432 - 445
  • [33] An introduction to block cipher cryptanalysis
    De Cannière, C
    Biryukov, A
    Preneel, B
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 346 - 356
  • [34] SPF-CA-1.2: an enhanced version of cellular automata-based block cipher system
    Achkoun, K.
    Hanin, C.
    Sadak, A.
    Ziani, F.
    Omary, F.
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS- COMPUTER SYSTEMS THEORY, 2021, 6 (03) : 194 - 208
  • [35] A stream cipher construction inspired by block cipher design principles
    De Canniere, Christophe
    INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 171 - 186
  • [36] Revised standard version
    Diggins, JP
    NATION, 1998, 266 (06) : 2 - 2
  • [37] 'Love, Revised Version'
    O'Sullivan, V
    LANDFALL, 1999, (198): : 235 - 235
  • [38] BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher
    Kumar, Binay
    Hussain, Muzzammil
    Kumar, Vijay
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 221 - 231
  • [39] COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse
    Andreeva, Elena
    Luykx, Atul
    Mennink, Bart
    Yasuda, Kan
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 187 - 204
  • [40] LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications
    Roy, Siddhartha
    Roy, Saptarshi
    Biswas, Arpita
    Baishnab, Krishna Lal
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2021, 15 (11): : 4122 - 4144