Abstract
For the demand of the resource constrained mobile terminal to the lightweight cipher, this paper presents a new lightweight stream cipher, which is based on the Feistel and OFB mode called SVHF. Similar to many other lightweight stream ciphers, the key-stream size of SVHF is 128-bit while the IV is specified to be 128 bits. Our security evaluation shows that SVHF can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis and impossible differential cryptanalysis. Furthermore, SVHF can be implemented efficiently not only in hardware environments but also in software plat-forms. Hardware implementation of SVHF requires about 1632GE, which is comparable with the 2194 GE hardware implementation of WG-7. The software implementation of SVHF on 8-bit microcontroller is about 50.82 Mb/s, and its efficiency is 4 times as much as that of WG-7 in RFID environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wireless Mobile Comput. 2(1), 86–93 (2007)
Luo, Y., Chai, Q., Gong, G.: A lightweight stream cipher WG-7 for RFID encryption and authentication. In: IEEE Global Telecommunications Conference, pp. 1–6. IEEE (2010)
Özen, O., Varici, K., Tezcan, C., Kocair, Ç.: Lightweight block ciphers revisited: cryptanalysis of reduced round PRESENT and HIGHT. In: Boyd, C., González Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 90–107. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02620-1_7
Mall, P., Bhuiyan, M.Z.A., Amin, R.: A lightweight secure communication protocol for IoT devices using physically unclonable function. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 26–35. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_3
Babaei, A., Schiele, G.: Spatial reconfigurable physical unclonable functions for the Internet of Things. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 312–321. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2_29
Long, J., Zhang, K., Wang, X., Dai, H.-N.: Lightweight distributed attribute based keyword search system for Internet of Things. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 253–264. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_21
Ragab, A., Selim, G., Wahdan, A., Madani, A.: Robust hybrid lightweight cryptosystem for protecting IoT smart devices. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 5–19. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_1
John, A.L., Thampi, S.M.: Encryption scheme based on hyperelliptic curve cryptography. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 491–506. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49148-6_40
Han, J., Wang, J.: an enhanced key management scheme for LoRaWAN. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 407–416. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_35
Shi, Z., Wu, F., Wang, C., Ren, S.: A lightweight RFID authentication protocol with forward security and randomized identifier. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 1–13. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49148-6_1
Berger, T.P., D’Hayer, J., Marquet, K., Minier, M., Thomas, G.: The GLUON family: a lightweight hash function family based on FCSRs. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 306–323. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31410-0_19
Aumasson, J.-P., Henzen, L., Meier, W., et al.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)
Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_21
Shirai, T., Shibutani, K., Akishita, T.: The 128-bit Block cipher CLEFIA. Fast Softw. Encryption 4593, 181–195 (2007)
Su, B., Wu, W., Zhang, W.: Differential Cryptanalysis of SMS4 Block Cipher. IACR. Cryptology Eprint Archive (2010)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33
Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., Sung, S.: Impossible differential cryptanalysis for block cipher structures. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 82–96. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-24582-7_6
Acknowledgement
In this paper, the research was sponsored by the Science & Technology Support Plan of Jiangsu Province under Grant No. BE2013879 and the NUAA Research Funding under Grant No. NS2010097.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Huang, Y., Zhu, W., Sun, W., Dai, X., Li, S. (2021). SVHF: A Lightweight Stream Cipher Based on Feistel and OFB. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-68884-4_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-68883-7
Online ISBN: 978-3-030-68884-4
eBook Packages: Computer ScienceComputer Science (R0)