A Lightweight Authenticated Cipher For Resource Constrained Environment
DOI:
https://doi.org/10.31436/ijpcc.v11i2.578Keywords:
Authenticated encryption, lightweight cryptography, block cipher, flexible key, symmetric encryptionAbstract
In this paper, a new lightweight authenticated encryption scheme that uses a lightweight block cipher is introduced. The cipher supports flexible key sizes starting from 128 bits, with the increment of 64 bits. Security evaluation shows that the cipher passed the evaluation of algebraic, differential and linear cryptanalysis which proved after 11 rounds, the attacker has no advantage over brute force attack. Furthermore, performance analysis is evaluated based on throughput (Mbps), latency (cycle) and area estimation (gate equivalence). Hardware implementations of the cipher require approximately 2526 GE with a throughput of 118Kbps running on Intel i5-8250 CPU using Python implementation
References
N. Katuk, R. Vergallo, T. Sugiharto, and R. A. Krisdiawan, "A client-based user authentication scheme for the cloud of things environment," J. Comput. Sci. Technol., vol. 22, no. 2, Art. no. e08, 2022. [Online]. Available: https://doi.org/10.24215/16666038.22.e08
J. Black, "Authenticated Encryption," in Encyclopedia of Cryptography and Security, H. C. A. Tilborg and S. Jajodia, Eds. Boston, MA, USA: Springer, 2011, pp. 52–61. [Online]. Available: https://doi.org/10.1007/978-1-4419-5906-5548
A. Banerjee, T. Reddy.K, D. Schoinianakis, T. Hollebeek, and M. Ounsworth, "Post-Quantum Cryptography for Engineers," Internet Eng. Task Force (IETF), Internet-Draft draft-ietf-pquip-pqc-engineers-09, Work in Progress, Feb. 2025. [Online]. Available: https://datatracker.ietf.org/doc/draft-ietf-pquip-pqc-engineers/09/
C. I. Rene, N. Katuk, and B. Osman, "A survey of cryptographic algorithms for lightweight authentication schemes in the Internet of Things environment," in Proc. 5th Int. Conf. Comput. Informat. Eng. (IC2IE), 2022, pp. 1–6. [Online]. Available: https://doi.org/10.1109/ic2ie56416.2022.9970015
A. Waheed, F. Subhan, M. M. Suud, M. Alam, and S. Ahmad, "An analytical review of current s-box design methodologies, performance evaluation criteria, and major challenges," Multimedia Tools Appl., vol. 82, no. 19, pp. 29689–29712, 2023.
E. Biham, R. Anderson, and L. Knudsen, "Serpent: A new block cipher proposal," in Fast Software Encryption, vol. 1372, LNCS, Springer, 1998, pp. 222–238.
W. Senpeng, H. Bin, G. Jie, S. Tairong, and Z. Kai, "Research on the security criterion of s-boxes against division property," Chin. J. Electron., vol. 30, no. 1, pp. 85–91, 2021.
T. Suzaki and K. Minematsu, "Improving the generalized Feistel," in Fast Software Encryption, vol. 6147, LNCS, Springer, 2010, pp. 19–39.
W.-Z. Yeoh, J. S. Teh, and J. Chen, "Automated search for block cipher differentials: A GPU-accelerated branch-and-bound algorithm," in Inf. Secur. Privacy, ACISP 2020, vol. 12248, LNCS, Springer, 2020, pp. 160–179.
A. Bogdanov et al., "PRESENT: An ultra-lightweight block cipher," in Cryptographic Hardware and Embedded Systems–CHES 2007, vol. 4727, LNCS, Springer, 2007, pp. 450–466.
C. Dobraunig, M. Eichlseder, F. Mendel, and M. Schl¨affer, "Ascon v1.2: Lightweight authenticated encryption and hashing," J. Cryptol., vol. 34, pp. 1–42, 2021.

