Skip to main content

SVHF: A Lightweight Stream Cipher Based on Feistel and OFB

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12383))

  • 989 Accesses

Abstract

For the demand of the resource constrained mobile terminal to the lightweight cipher, this paper presents a new lightweight stream cipher, which is based on the Feistel and OFB mode called SVHF. Similar to many other lightweight stream ciphers, the key-stream size of SVHF is 128-bit while the IV is specified to be 128 bits. Our security evaluation shows that SVHF can achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis and impossible differential cryptanalysis. Furthermore, SVHF can be implemented efficiently not only in hardware environments but also in software plat-forms. Hardware implementation of SVHF requires about 1632GE, which is comparable with the 2194 GE hardware implementation of WG-7. The software implementation of SVHF on 8-bit microcontroller is about 50.82 Mb/s, and its efficiency is 4 times as much as that of WG-7 in RFID environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hell, M., Johansson, T., Meier, W.: Grain: a stream cipher for constrained environments. Int. J. Wireless Mobile Comput. 2(1), 86–93 (2007)

    Article  Google Scholar 

  2. Luo, Y., Chai, Q., Gong, G.: A lightweight stream cipher WG-7 for RFID encryption and authentication. In: IEEE Global Telecommunications Conference, pp. 1–6. IEEE (2010)

    Google Scholar 

  3. Özen, O., Varici, K., Tezcan, C., Kocair, Ç.: Lightweight block ciphers revisited: cryptanalysis of reduced round PRESENT and HIGHT. In: Boyd, C., González Nieto, J. (eds.) ACISP 2009. LNCS, vol. 5594, pp. 90–107. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-02620-1_7

    Chapter  MATH  Google Scholar 

  4. Mall, P., Bhuiyan, M.Z.A., Amin, R.: A lightweight secure communication protocol for IoT devices using physically unclonable function. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11611, pp. 26–35. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24907-6_3

    Chapter  Google Scholar 

  5. Babaei, A., Schiele, G.: Spatial reconfigurable physical unclonable functions for the Internet of Things. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K. (eds.) SpaCCS 2017. LNCS, vol. 10658, pp. 312–321. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72395-2_29

    Chapter  Google Scholar 

  6. Long, J., Zhang, K., Wang, X., Dai, H.-N.: Lightweight distributed attribute based keyword search system for Internet of Things. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 253–264. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_21

    Chapter  Google Scholar 

  7. Ragab, A., Selim, G., Wahdan, A., Madani, A.: Robust hybrid lightweight cryptosystem for protecting IoT smart devices. In: Wang, G., Feng, J., Bhuiyan, M.Z.A., Lu, R. (eds.) SpaCCS 2019. LNCS, vol. 11637, pp. 5–19. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24900-7_1

    Chapter  Google Scholar 

  8. John, A.L., Thampi, S.M.: Encryption scheme based on hyperelliptic curve cryptography. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 491–506. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49148-6_40

    Chapter  Google Scholar 

  9. Han, J., Wang, J.: an enhanced key management scheme for LoRaWAN. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 407–416. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05345-1_35

    Chapter  Google Scholar 

  10. Shi, Z., Wu, F., Wang, C., Ren, S.: A lightweight RFID authentication protocol with forward security and randomized identifier. In: Wang, G., Ray, I., Alcaraz Calero, J.M., Thampi, S.M. (eds.) SpaCCS 2016. LNCS, vol. 10066, pp. 1–13. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-49148-6_1

    Chapter  Google Scholar 

  11. Berger, T.P., D’Hayer, J., Marquet, K., Minier, M., Thomas, G.: The GLUON family: a lightweight hash function family based on FCSRs. In: Mitrokotsa, A., Vaudenay, S. (eds.) AFRICACRYPT 2012. LNCS, vol. 7374, pp. 306–323. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31410-0_19

    Chapter  Google Scholar 

  12. Aumasson, J.-P., Henzen, L., Meier, W., et al.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013)

    Article  MathSciNet  Google Scholar 

  13. Bogdanov, A., Knežević, M., Leander, G., Toz, D., Varıcı, K., Verbauwhede, I.: spongent: a lightweight hash function. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 312–325. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-23951-9_21

    Chapter  Google Scholar 

  14. Shirai, T., Shibutani, K., Akishita, T.: The 128-bit Block cipher CLEFIA. Fast Softw. Encryption 4593, 181–195 (2007)

    Article  Google Scholar 

  15. Su, B., Wu, W., Zhang, W.: Differential Cryptanalysis of SMS4 Block Cipher. IACR. Cryptology Eprint Archive (2010)

    Google Scholar 

  16. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33

    Chapter  Google Scholar 

  17. Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., Sung, S.: Impossible differential cryptanalysis for block cipher structures. In: Johansson, T., Maitra, S. (eds.) INDOCRYPT 2003. LNCS, vol. 2904, pp. 82–96. Springer, Heidelberg (2003). https://doi.org/10.1007/978-3-540-24582-7_6

    Chapter  Google Scholar 

Download references

Acknowledgement

In this paper, the research was sponsored by the Science & Technology Support Plan of Jiangsu Province under Grant No. BE2013879 and the NUAA Research Funding under Grant No. NS2010097.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuhua Huang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Huang, Y., Zhu, W., Sun, W., Dai, X., Li, S. (2021). SVHF: A Lightweight Stream Cipher Based on Feistel and OFB. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2020. Lecture Notes in Computer Science(), vol 12383. Springer, Cham. https://doi.org/10.1007/978-3-030-68884-4_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-68884-4_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-68883-7

  • Online ISBN: 978-3-030-68884-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics