The 128-Bit Blockcipher CLEFIA (Extended Abstract)
Taizo Shirai,Kyoji Shibutani,Toru Akishita,Shiho Moriai,Tetsu Iwata +4 more
- pp 181-195
Reads0
Chats0
TLDR
A new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES is proposed, which achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and software.Abstract:
We propose a new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES. CLEFIA achieves enough immunity against known attacks and flexibility for efficient implementation in both hardware and software by adopting several novel and state-of-the-art design techniques. CLEFIA achieves a good performance profile both in hardware and software. In hardware using a 0.09 μm CMOS ASIC library, about 1.60 Gbps with less than 6 Kgates, and in software, about 13 cycles/byte, 1.48 Gbps on 2.4 GHz AMD Athlon 64 is achieved. CLEFIA is a highly efficient blockcipher, especially in hardware.read more
Citations
More filters
Book ChapterDOI
PRINCE: a low-latency block cipher for pervasive computing applications
Julia Borghoff,Anne Canteaut,Tim Güneysu,Elif Bilge Kavun,Miroslav Knezevic,Lars R. Knudsen,Gregor Leander,Ventzislav Nikov,Christof Paar,Christian Rechberger,Peter Maria Franciscus Rombouts,Søren S. Thomsen,Tolga Yalcin +12 more
TL;DR: In this paper, a block cipher called PRINCE is proposed that allows encryption of data within one clock cycle with a very competitive chip area compared to known solutions. But it does not have the α-reflection property, which holds that decryption for one key corresponds to encryption with another key.
Book ChapterDOI
Piccolo: an ultra-lightweight blockcipher
TL;DR: Piccolo is one of the competitive ultra-lightweight blockciphers which is suitable for extremely constrained environments such as RFID tags and sensor nodes and its efficiency on the energy consumption which is evaluated by energy per bit is also remarkable.
Book ChapterDOI
LBlock: a lightweight block cipher
Wenling Wu,Lei Zhang +1 more
TL;DR: In this paper, the authors proposed a new lightweight block cipher called LBlock, which can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis and related-key attacks.
Posted Content
PRINCE – A Low-latency Block Cipher for Pervasive Computing Applications
Julia Borghoff,Anne Canteaut,Tim Güneysu,Elif Bilge Kavun,Miroslav Knežević,Lars R. Knudsen,Gregor Leander,Ventzislav Nikov,Christof Paar,Christian Rechberger,Peter Maria Franciscus Rombouts,Søren S. Thomsen,Tolga Yalcin +12 more
TL;DR: This paper presents a block cipher that is optimized with respect to latency when implemented in hardware and holds that decryption for one key corresponds to encryption with a related key, which is of independent interest and proves its soundness against generic attacks.
Journal ArticleDOI
A roadmap for security challenges in the Internet of Things
TL;DR: According to the novel taxonomy of IoT framework, different research challenges will be highlighted, important solutions and research activities will be exposed, and interesting research directions will be proposed to ensure security of IoT components and applications.
References
More filters
Book
The Design of Rijndael: AES - The Advanced Encryption Standard
Joan Daemen,Vincent Rijmen +1 more
TL;DR: The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked.
Book ChapterDOI
Linear cryptanalysis method for DES cipher
TL;DR: A new method is introduced for cryptanalysis of DES cipher, which is essentially a known-plaintext attack, that is applicable to an only-ciphertext attack in certain situations.
BookDOI
The Design of Rijndael
Joan Daemen,Vincent Rijmen +1 more
TL;DR: This volume is the authoritative guide to the Rijndael algorithm and AES and professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
Book
Fast Software Encryption
TL;DR: Simplified variants that omit a quadratic function and a fixed rotation in RC6 are examined to clarify their essential contribution to the overall security of RC6.