|
|
DBST: a lightweight block cipher based on dynamic S-box |
Liuyan YAN1,2, Lang LI1,2(), Ying GUO1,2 |
1. College of Computer Science and Technology, Hengyang Normal University, Hengyang 421002, China 2. Hunan Provincial Key Laboratory of Intelligent Information Processing and Application, Hengyang Normal University, Hengyang 421002, China |
|
|
Abstract IoT devices have been widely used with the advent of 5G. These devices contain a large amount of private data during transmission. It is primely important for ensuring their security. Therefore, we proposed a lightweight block cipher based on dynamic S-box named DBST. It is introduced for devices with limited hardware resources and high throughput requirements. DBST is a 128-bit block cipher supporting 64-bit key, which is based on a new generalized Feistel variant structure. It retains the consistency and significantly boosts the diffusion of the traditional Feistel structure. The SubColumns of round function is implemented by combining bit-slice technology with subkeys. The S-box is dynamically associated with the key. It has been demonstrated that DBST has a good avalanche effect, low hardware area, and high throughput. Our S-box has been proven to have fewer differential features than RECTANGLE S-box. The security analysis of DBST reveals that it can against impossible differential attack, differential attack, linear attack, and other types of attacks.
|
Keywords
internet of things
5G
dynamic S-box
bit-slice technology
lightweight block cipher
|
Corresponding Author(s):
Lang LI
|
About author: Tongcan Cui and Yizhe Hou contributed equally to this work. |
Just Accepted Date: 25 March 2022
Issue Date: 19 October 2022
|
|
1 |
A, Bogdanov L R, Knudsen G, Leander C, Paar A, Poschmann M J B, Robshaw Y, Seurin C Vikkelsoe . PRESENT: an ultra-lightweight block cipher. In: Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems. 2007, 450–466
|
2 |
J, Feng L Li . SCENERY: a lightweight block cipher based on Feistel structure. Frontiers of Computer Science, 2022, 16( 3): 163813
|
3 |
S, Banik Z, Bao T, Isobe H, Kubo F, Liu K, Minematsu K, Sakamoto N, Shibata M Shigeri . WARP: revisiting GFN for lightweight 128-bit block cipher. In: Proceedings of the 27th International Conference on Selected Areas in Cryptography. 2020, 535–564
|
4 |
R, Beaulieu D, Shors J, Smith S, Treatman-Clark B, Weeks L Wingers . The SIMON and SPECK lightweight block ciphers. In: Proceedings of the 52nd Annual Design Automation Conference. 2015, 175
|
5 |
Y, Guo L, Li B Liu . Shadow: a lightweight block cipher for IoT nodes. IEEE Internet of Things Journal, 2021, 8( 16): 13014–13023
|
6 |
X, Dai Y, Huang L, Chen T, Lu F Su . VH: a lightweight block cipher based on dual pseudo-random transformation. In: Proceedings of the 1st International Conference on Cloud Computing and Security. 2015, 3–13
|
7 |
G, Bansod N, Pisharoty A Patil . BORON: an ultra-lightweight and low power encryption design for pervasive computing. Frontiers of Information Technology & Electronic Engineering, 2017, 18( 3): 317–331
|
8 |
B, Koo D, Roh H, Kim Y, Jung D G, Lee D Kwon . CHAM: a family of lightweight block ciphers for resource-constrained devices. In: Proceedings of the 20th International Conference on Information Security and Cryptology. 2017, 3–25
|
9 |
J, Zhang Y, Zhao J, Wu B Chen . LVPDA: a lightweight and verifiable privacy-preserving data aggregation scheme for edge-enabled IoT. IEEE Internet of Things Journal, 2020, 7( 5): 4016–4027
|
10 |
S, Banik S K, Pandey T, Peyrin Y, Sasaki S M, Sim Y Todo . GIFT: a small present: towards reaching the limit of lightweight encryption. In: Proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems. 2017, 321–345
|
11 |
L, Li B, Liu H Wang . QTL: a new ultra-lightweight block cipher. Microprocessors and Microsystems, 2016, 45: 45–55
|
12 |
J, Kwon B, Lee J, Lee D Moon . FPL: white-box secure block cipher using parallel table look-ups. In: Proceedings of Cryptographers’ Track at the RSA Conference. 2020, 106–128
|
13 |
L, Li B, Liu Y, Zhou Y Zou . SFN: a new lightweight block cipher. Microprocessors and Microsystems, 2018, 60: 138–150
|
14 |
W, Zhang Z, Bao D, Lin V, Rijmen B, Yang I Verbauwhede . RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Science China Information Sciences, 2015, 58( 12): 1–15
|
15 |
E Biham . A fast new DES implementation in software. In: Proceedings of the 4th International Workshop on Fast Software Encryption. 1997, 260–272
|
16 |
L K, Chen R T Zhang . Novel software block cipher using dynamic s-box and p-box. Computer Science, 2009, 36( 2): 78–81
|
17 |
F, Chabaud S Vaudenay . Links between differential and linear cryptanalysis. In: Proceedings of Workshop on the Theory and Application of Cryptographic Techniques. 1994, 356–365
|
18 |
J B, Kam G I Davida . Structured design of substitution-permutation encryption networks. IEEE Transactions on Computers, 1979, C-28( 10): 747–753
|
19 |
H Feistel . Cryptography and computer privacy. Scientific American, 1973, 228( 5): 15–23
|
20 |
A F, Webster S E Tavares . On the design of S-boxes. In: Williams H C, ed. Advances in Cryptology — CRYPTO ’85 Proceedings. Berlin: Springer, 1985, 523–534
|
21 |
Y H, Huang X J, Dai Y Y, Shi N Z, Liu Q X, Zeng F Su . Ultra-lightweight block cipher algorithm (PFP) based on feistel structure. Computer Science, 2017, 44( 3): 163–167
|
22 |
V, Tiwari A, Singh A N Tentu . Differential cryptanalysis on DES cryptosystem up to eight rounds. International Journal of Information Privacy, Security and Integrity, 2019, 4( 1): 1–29
|
23 |
T, Ashur O, Dunkelman N Masalha . Linear cryptanalysis reduced round of piccolo-80. In: Proceedings of the 3rd International Symposium on Cyber Security Cryptography and Machine Learning. 2019, 16–32
|
24 |
M, Tolba A, Abdelkhalek A M Youssef . Impossible differential cryptanalysis of reduced-round SKINNY. In: Proceedings of the 9th International Conference on Cryptology in Africa. 2017, 117–134
|
25 |
N T, Courtois J Pieprzyk . Cryptanalysis of block ciphers with overdefined systems of equations. In: Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security. 2002, 267–287
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|