CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices

@inproceedings{Koo2017CHAMAF,
  title={CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices},
  author={Bonwook Koo and Dongyoung Roh and Hyeonjin Kim and Younghoon Jung and Donggeon Lee and Daesung Kwon},
  booktitle={ICISC},
  year={2017}
}
In this paper, we propose a family of lightweight block ciphers CHAM that has remarkable efficiency on resource-constrained devices. The family consists of three ciphers, CHAM-64/128, CHAM-128/128, and CHAM-128/256 which are of the generalized 4-branch Feistel structure based on ARX (Addition, Rotation, XOR) operations. 
µ2 : A Lightweight Block Cipher
This paper presents a 64-bit lightweight block cipher, µ2 with a key size of 80-bit. µ2 is designed based on well-established design paradigms, achieving comparable performance and security whenExpand
Revised Version of Block Cipher CHAM
TLDR
This work found new (related-key) differential characteristics and differentials of CHAM using a SAT solver and provides strong evidence that CHAM with these new numbers of rounds is secure enough against ( related- key) differential cryptanalysis. Expand
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor
TLDR
This article presents a fast implementation method for ARX-based block ciphers, named two-way operation, and estimated the performance in terms of execution time (cycles per byte) on a 32-bit Advanced RISC Machines processor. Expand
Study on Optimizing Block Ciphers (AES, CHAM) on Graphic Processing Units
  • S. An, S. Seo
  • Computer Science
  • 2020 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia)
  • 2020
TLDR
This paper study how to optimize AES, a representative standard block cipher algorithm, and CHAM, a recently proposed lightweight block ciphergorithm, in the GPU environment to achieve performance improvement up to a dozen times than classical CPU implementation on a 64-bit operating system. Expand
Gradient Cryptanalysis of Block Cipher CHAM 64/128
  • B. Ryabko, A. Soskov, A. Fionov
  • Computer Science
  • 2019 XVI International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY)
  • 2019
TLDR
Results of cryptanalysis of the lightweight block cipher CHAM 64/128 carried out by means of a so-called gradient statistical attack show that after 23 rounds the secret key can be determined with probability 0.01 under the length of the input sample 231 bytes and complexity 237 round function evaluations. Expand
High-Speed Implementation to CHAM-64/128 Counter Mode with Round Key Pre-Load Technique
TLDR
The optimized implementation for block cipher CHAM-CTR, which can be skipped some rounds by pre-computation, has better calculating speed than existing CHAM and makes reduced 160cycles loading time for round key load. Expand
Secure and Fast Implementation of ARX-Based Block Ciphers Using ASIMD Instructions in ARMv8 Platforms
TLDR
This paper presents secure and fast implementations of ARX-based block ciphers HIGHT and revised CHAM in ARMv8 platforms and proposes enhanced random shuffling method which is the core operation for the proposed countermeasure. Expand
Information Security and Cryptology – ICISC 2019: 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers
TLDR
This work finds new (relatedkey) differential characteristics and differentials of CHAM using a SAT solver and provides strong evidence that CHAM with these new numbers of rounds is secure enough against (related-keys) differential cryptanalysis. Expand
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
TLDR
This paper extends RX-cryptanalysis to AND-RX ciphers, a similar design paradigm where the modular addition is replaced by vectorial bitwise AND; such cipher include the block cipher families Simon and Simeck. Expand
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
TLDR
The state-of-the-art lightweight block ciphers are reviewed, a comprehensive design niche is presented, a detailed taxonomy with multiple classifications is given and future research directions are presented. Expand
...
1
2
3
4
...

References

SHOWING 1-10 OF 61 REFERENCES
LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
TLDR
A new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit key size is proposed, which provides a high-speed software encryption on general-purpose processors and is secure against all the existing attacks on block ciphers. Expand
SIMON and SPECK: Block Ciphers for the Internet of Things
The U.S. National Security Agency (NSA) developed the Simon and Speck families of lightweight block ciphers as an aid for securing applications in very constrained environments where AES may not beExpand
PRESENT: An Ultra-Lightweight Block Cipher
TLDR
An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks. Expand
The LED Block Cipher
TLDR
This work considers the resistance of ciphers, and LED in particular, to related-key attacks, and is able to derive simple yet interesting AES-like security proofs for LED regarding related- or single- key attacks. Expand
HIGHT: A New Block Cipher Suitable for Low-Resource Device
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing deviceExpand
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
TLDR
This work designs a block cipher that fits well the masking constraints of a proven masking scheme, and chooses an adequate S-box, which is non-bijective. Expand
The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
TLDR
This paper discusses software performance and demonstrates how to achieve high performance implementations of Simon and Speck on the AVR family of 8-bit microcontrollers. Expand
Block Ciphers - Focus on the Linear Layer (feat. PRIDE)
TLDR
A general methodology to construct good, sometimes optimal, linear layers allowing for a large variety of trade-offs is proposed and PRIDE is optimized for 8-bit micro-controllers and significantly outperforms all academic solutions both in terms of code size and cycle count. Expand
Triathlon of lightweight block ciphers for the Internet of things
TLDR
The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state of the art and allows standardization organizations to conduct a fair and consistent evaluation of a large number of candidates. Expand
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
TLDR
This paper provides implementations of 12 block ciphers on an ATMEL AVR ATtiny45 8-bit microcontroller, and makes the corresponding source code available on a web page, and evaluates performance figures of the implementations with respect to different metrics, including energy-consumption measurements and shows improvements compared to existing implementations. Expand
...
1
2
3
4
5
...