Revised Version of Block Cipher CHAM

被引:16
|
作者
Seo, Jae Hong [1 ]
Roh, Dongyoung [1 ]
Koo, Bonwook [1 ]
Jung, Younghoon [1 ]
Jeong, Il Woong [1 ]
Lee, Dong-Geon [1 ]
Kwon, Daesung [1 ]
Kim, Woo-Hwan [1 ]
机构
[1] Affiliated Inst ETRI, Daejeon, South Korea
关键词
Lightweight block cipher; CHAM; (Related-key) Differential cryptanalysis; SAT solver; DESIGN;
D O I
10.1007/978-3-030-40921-0_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
CHAM is a family of lightweight block ciphers published in 2017 [22]. The CHAM family consists of three ciphers, CHAM-64/128, CHAM-128/128, and CHAM-128/256. CHAM can be implemented with a remarkably low area in hardware compared to other lightweight block ciphers, and it also performs well on software. We found new (related-key) differential characteristics and differentials of CHAM using a SAT solver. Although attacks using the new characteristics are limited to the reduced rounds of CHAM, it is preferable to increase the number of rounds to ensure a sufficient security margin. The numbers of rounds of CHAM-64/128, CHAM-128/128, and CHAM-128/256 are increased from 80 to 88, 80 to 112, and 96 to 120, respectively. We provide strong evidence that CHAM with these new numbers of rounds is secure enough against (related-key) differential cryptanalysis. Because increasing the number of rounds does not affect the area in low-area hardware implementations, the revised CHAM is still excellent in lightweight hardware implementations. In software, the revised CHAM is still comparable to SPECK, one of the top-ranked algorithms in software.
引用
收藏
页码:1 / 19
页数:19
相关论文
共 50 条
  • [41] The research and design of reconfigurable cipher processing architecture targeted at block cipher
    Dai, Zi-Bin
    Yang, Xiao-Hui
    Ren, Qiao
    Yu, Xue-Rong
    ASICON 2007: 2007 7TH INTERNATIONAL CONFERENCE ON ASIC, VOLS 1 AND 2, PROCEEDINGS, 2007, : 814 - 817
  • [42] A middleware design for block cipher seamless connected into stream cipher mode
    Luo, Lan
    Qin, ZhiGuang
    Zhou, ShiJie
    Jiang, ShaoQuan
    Wang, Juan
    2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 64 - +
  • [43] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Wang, Xingyuan
    Wang, Xiaojuan
    Zhao, Jianfeng
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2011, 63 (04) : 587 - 597
  • [44] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Xingyuan Wang
    Xiaojuan Wang
    Jianfeng Zhao
    Zhenfeng Zhang
    Nonlinear Dynamics, 2011, 63 : 587 - 597
  • [45] Error Correction of Noisy Block Cipher using Cipher and Plaintext Characteristics
    Mirza, Nabil M. K.
    Osman, Ziad
    Zantout, Rached
    El-Sayed, Mohamed
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 151 - +
  • [46] Cryptanalysis of full PRIDE block cipher
    Yibin DAI
    Shaozhen CHEN
    Science China(Information Sciences), 2017, 60 (05) : 169 - 180
  • [47] A Compact Design of SEED Block Cipher
    Pirpilidis, Filippos
    Kitsos, Paris
    Kakarountas, Athanasios
    2015 4TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2015, : 119 - 123
  • [48] Linear cryptanalysis of NUSH block cipher
    吴文玲
    冯登国
    ScienceinChina(SeriesF:InformationSciences), 2002, (01) : 59 - 67
  • [49] A block cipher involving interlacing and decomposition
    SreeNidhi Institute of Science and Technology, Hyderabad, India
    不详
    Inf. Technol. J., 2007, 3 (396-404): : 396 - 404
  • [50] Cryptanalysis of full PRIDE block cipher
    Dai, Yibin
    Chen, Shaozhen
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)