Log in

LTLBC: a low-latency lightweight block cipher for internet of things

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The low-latency property is becoming increasingly crucial in response to the demand for data processing in the Internet of Things (IoT) environment, especially in lightweight cryptography. A low-latency lightweight block cipher called LTLBC is proposed in this paper. In particular, we propose a hybrid approach of word-wise involutive map** and a bit-wise permutation, with careful selection of the shift and permutation parameters. This scheme enables LTLBC to achieve better diffusion than Midori and MANTIS. Also, a \(4\times 4\) S-box which is constructed through a gate-level bottom-up circuit search has good security and latency characteristics. LTLBC mainly focuses on the hardware environment of fully unrolled architecture. LTLBC achieves a minimum latency of around 4.73 ns, with a total area of only 10007.6 \(\mu m^2\) based on NanGate 45nm technology. The comprehensive safety analysis shows LTLBC has sufficient redundancy rounds to resist attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential cryptanalysis, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Thailand)

Instant access to the full article PDF.

Fig. 1
Algorithm 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Data availability

No data were used for the research described in the article.

Notes

  1. More rounds (\(n\ge 6\)) cannot be solved due to the long-running time of the bit-wise MILP model.

References

  1. Khan, M.N., Rao, A., Camtepe, S.: Lightweight cryptographic protocols for IoT-constrained devices: a survey. IEEE Internet Things J. 8(6), 4132–4156 (2021). https://doi.org/10.1109/JIOT.2020.3026493

    Article  Google Scholar 

  2. Guo, Y., Li, L., Liu, B.: Shadow: a lightweight block cipher for IoT nodes. IEEE Internet Things J. 8(16), 13014–13023 (2021). https://doi.org/10.1109/JIOT.2021.3064203

    Article  Google Scholar 

  3. Li, Y., Feng, J., Zhao, Q., Wei, Y.: HDLBC: a lightweight block cipher with high diffusion. Integration (2024). https://doi.org/10.1016/j.vlsi.2023.102090

    Article  Google Scholar 

  4. Banik, S., Bao, Z., Isobe, T., Kubo, H., Liu, F., Minematsu, K., Sakamoto, K., Shibata, N., Shigeri, M.: WARP : Revisiting GFN for lightweight 128-bit block cipher. In: Dunkelman, O., Jr., M.J.J., O’Flynn, C. (eds.) Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers. Lecture Notes in Computer Science, vol. 12804, pp. 535–564 (2020). https://doi.org/10.1007/978-3-030-81652-0_21

  5. Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., Regazzoni, F.: Midori: A block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9453, pp. 411–436 (2015). https://doi.org/10.1007/978-3-662-48800-3_17

  6. Huang, X., Li, L., Yang, J.: IVLBC: an involutive lightweight block cipher for internet of things. IEEE Syst. J. 17(2), 3192–3203 (2023). https://doi.org/10.1109/JSYST.2022.3227951

    Article  Google Scholar 

  7. Beierle, C., Leander, G., Moradi, A., Rasoolzadeh, S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 2019(1), 5–45 (2019) https://doi.org/10.13154/TOSC.V2019.I1.5-45

  8. Knezevic, M., Nikov, V., Rombouts, P.: Low-latency encryption - is "lightweight = light + wait"? In: Prouff, E., Schaumont, P. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2012 - 14th International Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7428, pp. 426–446 (2012). https://doi.org/10.1007/978-3-642-33027-8_25

  9. Canale, F., Güneysu, T., Leander, G., Thoma, J.P., Todo, Y., Ueno, R.: SCARF - A low-latency block cipher for secure cache-randomization. In: Calandrino, J.A., Troncoso, C. (eds.) 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 1937–1954 (2023). https://www.usenix.org/conference/usenixsecurity23/presentation/canale

  10. Belkheyar, Y., Daemen, J., Dobraunig, C., Ghosh, S., Rasoolzadeh, S.: Bipbip: A low-latency tweakable block cipher with small dimensions. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(1), 326–368 (2023) https://doi.org/10.46586/TCHES.V2023.I1.326-368

  11. Zhang, L., Wu, R., Zhang, Y., Zheng, Y., Wu, W.: LLLWBC: A new low-latency light-weight block cipher. In: Deng, Y., Yung, M. (eds.) Information Security and Cryptology - 18th International Conference, Inscrypt 2022, Bei**g, China, December 11-13, 2022, Revised Selected Papers. Lecture Notes in Computer Science, vol. 13837, pp. 23–42 (2022). https://doi.org/10.1007/978-3-031-26553-2_2

  12. Gupta, K.C., Pandey, S.K., Samanta, S.: FUTURE: A lightweight block cipher using an optimal diffusion matrix. In: Batina, L., Daemen, J. (eds.) Progress in Cryptology - AFRICACRYPT 2022: 13th International Conference on Cryptology in Africa, AFRICACRYPT 2022, Fes, Morocco, July 18-20, 2022, Proceedings. Lecture Notes in Computer Science, pp. 28–52 (2022). https://doi.org/10.1007/978-3-031-17433-9_2

  13. Borghoff, J., Canteaut, A., Güneysu, T., Kavun, E.B., Knezevic, M., Knudsen, L.R., Leander, G., Nikov, V., Paar, C., Rechberger, C., Rombouts, P., Thomsen, S.S., Yalçin, T.: PRINCE - A low-latency block cipher for pervasive computing applications - extended abstract. In: Wang, X., Sako, K. (eds.) Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Bei**g, China, December 2-6, 2012. Proceedings. Lecture Notes in Computer Science, vol. 7658, pp. 208–225 (2012). https://doi.org/10.1007/978-3-642-34961-4_14

  14. Beierle, C., Jean, J., Kölbl, S., Leander, G., Moradi, A., Peyrin, T., Sasaki, Y., Sasdrich, P., Sim, S.M.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II. Lecture Notes in Computer Science, vol. 9815, pp. 123–153 (2016). https://doi.org/10.1007/978-3-662-53008-5_5

  15. Avanzi, R.: The QARMA block cipher family. almost MDS matrices over rings with zero divisors, nearly symmetric even-mansour constructions with non-involutory central rounds, and search heuristics for low-latency s-boxes. IACR Trans. Symmetric Cryptol. 2017(1), 4–44 (2017) https://doi.org/10.13154/TOSC.V2017.I1.4-44

  16. Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: A small present - towards reaching the limit of lightweight encryption. In: Fischer, W., Homma, N. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings. Lecture Notes in Computer Science, vol. 10529, pp. 321–345 (2017). https://doi.org/10.1007/978-3-319-66787-4_16

  17. Leander, G., Moos, T., Moradi, A., Rasoolzadeh, S.: The SPEEDY family of block ciphers engineering an ultra low-latency cipher from gate level for secure processor architectures. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2021(4), 510–545 (2021) https://doi.org/10.46586/TCHES.V2021.I4.510-545

  18. Bao, Z., Guo, J., Ling, S., Sasaki, Y.: PEIGEN - a platform for evaluation, implementation, and generation of s-boxes. IACR Trans. Symmetric Cryptol. 2019(1), 330–394 (2019) https://doi.org/10.13154/TOSC.V2019.I1.330-394

  19. Wei, Y., Ye, T., Wu, W., Pasalic, E.: Generalized nonlinear invariant attack and a new design criterion for round constants. IACR Trans. Symmetric Cryptol. 2018(4), 62–79 (2018) https://doi.org/10.13154/TOSC.V2018.I4.62-79

  20. Khoo, K., Peyrin, T., Poschmann, A.Y., Yap, H.: FOAM: searching for hardware-optimal SPN structures and components with a fair comparison. In: Batina, L., Robshaw, M. (eds.) Cryptographic Hardware and Embedded Systems - CHES 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings. Lecture Notes in Computer Science, vol. 8731, pp. 433–450 (2014). https://doi.org/10.1007/978-3-662-44709-3_24

  21. Rashidi, B.: High-throughput and flexible ASIC implementations of SIMON and SPECK lightweight block ciphers. Int. J. Circuit Theory Appl. 47(8), 1254–1268 (2019). https://doi.org/10.1002/CTA.2645

    Article  Google Scholar 

  22. Yli-Mäyry, V., Homma, N., Aoki, T.: Power analysis on unrolled architecture with points-of-interest search and its application to PRINCE block cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1), 149–157 (2017) https://doi.org/10.1587/TRANSFUN.E100.A.149

  23. Sasaki, Y., Todo, Y.: New algorithm for modeling s-box in MILP based differential and division trail search. In: Farshim, P., Simion, E. (eds.) Innovative Security Solutions for Information Technology and Communications - 10th International Conference, SecITC 2017, Bucharest, Romania, June 8-9, 2017, Revised Selected Papers. Lecture Notes in Computer Science, vol. 10543, pp. 150–165 (2017). https://doi.org/10.1007/978-3-319-69284-5_11

  24. Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C., Yung, M., Lin, D. (eds.) Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Bei**g, China, November 30 - December 3, 2011. Revised Selected Papers. Lecture Notes in Computer Science, vol. 7537, pp. 57–76 (2011). https://doi.org/10.1007/978-3-642-34704-7_5

  25. Liu, Y., **ang, Z., Chen, S., Zhang, S., Zeng, X.: A novel automatic technique based on MILP to search for impossible differentials. In: Tibouchi, M., Wang, X. (eds.) Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part I. Lecture Notes in Computer Science, vol. 13905, pp. 119–148 (2023). https://doi.org/10.1007/978-3-031-33488-7_5

  26. Yeo, S.L., Le, D., Khoo, K.: Improved algebraic attacks on lightweight block ciphers. J. Cryptogr. Eng. 11(1), 1–19 (2021). https://doi.org/10.1007/S13389-020-00237-4

    Article  Google Scholar 

Download references

Funding

This research is supported by the Hunan Provincial Natural Science Foundation of China ( 2022JJ30103 ), " the 14th Five Year Plan " Key Disciplines and Application-oriented Special Disciplines of Hunan Province ( **angjiaotong [2022] 351 ), the Science and Technology Innovation Program of Hunan Province ( 2016TP1020 ).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lang Li.

Ethics declarations

Conflict of interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: Test Vectors

Appendix A: Test Vectors

The test vectors of LTLBC (in hex notation) are given in Table 12.

Table 12 The test vectors of LTLBC

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, W., Li, L. & Huang, X. LTLBC: a low-latency lightweight block cipher for internet of things. Cluster Comput (2024). https://doi.org/10.1007/s10586-024-04476-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10586-024-04476-6

Keywords

Navigation