Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA. Compact hardware implementations are important for enabling security services on constrained devices like radio-frequency identification (RFID) tags or sensor nodes where chip area is highly limited. In this work we present compact hardware implementations of the block ciphers: mCrypton, NOEKEON, and SEA. Our implementations are significantly smaller in terms of chip area than the results available in related work. In case of NOEKEON, we even provide the first hardware-implementation results of this algorithm at all. Our implementations are designed as stand-alone hardware modules, contain an 8-bit interface for communication, and support encryption as well as decryption operation. We give results for different datapath widths and evaluate also the impact of using shift registers or latch-based memory instead of flip flops. The most-compact implementation of mCrypton requires 2 709 GEs when using a 130 nm CMOS process technology from Faraday. NOEKEON and SEA consume 2 880 and 2 562 GEs, respectively.

References in zbMATH (referenced in 24 articles )

Showing results 1 to 20 of 24.
Sorted by year (citations)

1 2 next

  1. Chen, Shiyao; Fan, Yanhong; Sun, Ling; Fu, Yong; Zhou, Haibo; Li, Yongqing; Wang, Meiqin; Wang, Weijia; Guo, Chun: SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations (2022)
  2. Mennink, Bart; Neves, Samuel: On the resilience of Even-Mansour to invariant permutations (2021)
  3. Daemen, Joan; Rijmen, Vincent: The design of Rijndael. The Advanced Encryption Standard (AES) (2020)
  4. Journault, Anthony; Standaert, François-Xavier; Varici, Kerem: Improving the security and efficiency of block ciphers based on LS-designs (2017)
  5. Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian; Roy, Arnab; Tiessen, Tyge: MiMC: efficient encryption and cryptographic hashing with minimal multiplicative complexity (2016)
  6. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
  7. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  8. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  9. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  10. Dinu, Daniel; Perrin, Léo; Udovenko, Aleksei; Velichkov, Vesselin; Großschädl, Johann; Biryukov, Alex: Design strategies for ARX with provable bounds: \textscSparxand \textscLAX (2016)
  11. Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi: Key recovery attacks on iterated Even-Mansour encryption schemes (2016)
  12. Picek, Stjepan; Yang, Bohan; Mentens, Nele: A search strategy to optimize the affine variant properties of S-boxes (2016)
  13. Sasdrich, Pascal; Moradi, Amir; Güneysu, Tim: White-box cryptography in the gray box (2016)
  14. Tan, Yin; Gong, Guang; Zhu, Bo: Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions (2016)
  15. Tezcan, Cihangir: Improbable differential attacks on \textttPRESENTusing undisturbed bits (2014)
  16. Abdelraheem, Mohamed Ahmed; Ågren, Martin; Beelen, Peter; Leander, Gregor: On the distribution of linear biases: three instructive examples (2012)
  17. Borghoff, Julia; Canteaut, Anne; Güneysu, Tim; Kavun, Elif Bilge; Knezevic, Miroslav; Knudsen, Lars R.; Leander, Gregor; Nikov, Ventzislav; Paar, Christof; Rechberger, Christian; Rombouts, Peter; Thomsen, Søren S.; Yalçın, Tolga: PRINCE -- a low-latency block cipher for pervasive computing applications. Extended abstract (2012)
  18. Plos, Thomas; Dobraunig, Christoph; Hofinger, Markus; Oprisnik, Alexander; Wiesmeier, Christoph; Wiesmeier, Johannes: Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA (2012)
  19. Saarinen, Markku-Juhani O.: Cryptographic analysis of all (4 \times4)-bit s-boxes (2012)
  20. Leander, Gregor; Abdelraheem, Mohamed Ahmed; AlKhzaimi, Hoda; Zenner, Erik: A cryptanalysis of \textscPRINTcipher: the invariant subspace attack (2011)

1 2 next