CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices

  title={CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices},
  author={Bonwook Koo and Dongyoung Roh and Hyeonjin Kim and Younghoon Jung and Donggeon Lee and Daesung Kwon},
In this paper, we propose a family of lightweight block ciphers CHAM that has remarkable efficiency on resource-constrained devices. The family consists of three ciphers, CHAM-64/128, CHAM-128/128, and CHAM-128/256 which are of the generalized 4-branch Feistel structure based on ARX (Addition, Rotation, XOR) operations. 
µ2 : A Lightweight Block Cipher
This paper presents a 64-bit lightweight block cipher, µ2 with a key size of 80-bit. µ2 is designed based on well-established design paradigms, achieving comparable performance and security when
Revised Version of Block Cipher CHAM
This work found new (related-key) differential characteristics and differentials of CHAM using a SAT solver and provides strong evidence that CHAM with these new numbers of rounds is secure enough against ( related- key) differential cryptanalysis.
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor
This article presents a fast implementation method for ARX-based block ciphers, named two-way operation, and estimated the performance in terms of execution time (cycles per byte) on a 32-bit Advanced RISC Machines processor.
Study on Optimizing Block Ciphers (AES, CHAM) on Graphic Processing Units
  • S. An, S. Seo
  • Computer Science
    2020 IEEE International Conference on Consumer Electronics - Asia (ICCE-Asia)
  • 2020
This paper study how to optimize AES, a representative standard block cipher algorithm, and CHAM, a recently proposed lightweight block ciphergorithm, in the GPU environment to achieve performance improvement up to a dozen times than classical CPU implementation on a 64-bit operating system.
Gradient Cryptanalysis of Block Cipher CHAM 64/128
  • B. Ryabko, A. Soskov, A. Fionov
  • Computer Science, Mathematics
    2019 XVI International Symposium "Problems of Redundancy in Information and Control Systems" (REDUNDANCY)
  • 2019
Results of cryptanalysis of the lightweight block cipher CHAM 64/128 carried out by means of a so-called gradient statistical attack show that after 23 rounds the secret key can be determined with probability 0.01 under the length of the input sample 231 bytes and complexity 237 round function evaluations.
High-Speed Implementation to CHAM-64/128 Counter Mode with Round Key Pre-Load Technique
The optimized implementation for block cipher CHAM-CTR, which can be skipped some rounds by pre-computation, has better calculating speed than existing CHAM and makes reduced 160cycles loading time for round key load.
Secure and Fast Implementation of ARX-Based Block Ciphers Using ASIMD Instructions in ARMv8 Platforms
This paper presents secure and fast implementations of ARX-based block ciphers HIGHT and revised CHAM in ARMv8 platforms and proposes enhanced random shuffling method which is the core operation for the proposed countermeasure.
Information Security and Cryptology – ICISC 2019: 22nd International Conference, Seoul, South Korea, December 4–6, 2019, Revised Selected Papers
This work finds new (relatedkey) differential characteristics and differentials of CHAM using a SAT solver and provides strong evidence that CHAM with these new numbers of rounds is secure enough against (related-keys) differential cryptanalysis.
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers
This paper extends RX-cryptanalysis to AND-RX ciphers, a similar design paradigm where the modular addition is replaced by vectorial bitwise AND; such cipher include the block cipher families Simon and Simeck.
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
The state-of-the-art lightweight block ciphers are reviewed, a comprehensive design niche is presented, a detailed taxonomy with multiple classifications is given and future research directions are presented.


LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors
A new block cipher LEA, which has 128-bit block size and 128, 192, or 256-bit key size is proposed, which provides a high-speed software encryption on general-purpose processors and is secure against all the existing attacks on block ciphers.
SIMON and SPECK: Block Ciphers for the Internet of Things
The U.S. National Security Agency (NSA) developed the Simon and Speck families of lightweight block ciphers as an aid for securing applications in very constrained environments where AES may not be
PRESENT: An Ultra-Lightweight Block Cipher
An ultra-lightweight block cipher, present, which is competitive with today's leading compact stream ciphers and suitable for extremely constrained environments such as RFID tags and sensor networks.
The LED Block Cipher
This work considers the resistance of ciphers, and LED in particular, to related-key attacks, and is able to derive simple yet interesting AES-like security proofs for LED regarding related- or single- key attacks.
HIGHT: A New Block Cipher Suitable for Low-Resource Device
In this paper, we propose a new block cipher HIGHT with 64-bit block length and 128-bit key length. It provides low-resource hardware implementation, which is proper to ubiquitous computing device
PICARO - A Block Cipher Allowing Efficient Higher-Order Side-Channel Resistance
This work designs a block cipher that fits well the masking constraints of a proven masking scheme, and chooses an adequate S-box, which is non-bijective.
The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
This paper discusses software performance and demonstrates how to achieve high performance implementations of Simon and Speck on the AVR family of 8-bit microcontrollers.
Block Ciphers - Focus on the Linear Layer (feat. PRIDE)
A general methodology to construct good, sometimes optimal, linear layers allowing for a large variety of trade-offs is proposed and PRIDE is optimized for 8-bit micro-controllers and significantly outperforms all academic solutions both in terms of code size and cycle count.
Triathlon of lightweight block ciphers for the Internet of things
The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state of the art and allows standardization organizations to conduct a fair and consistent evaluation of a large number of candidates.
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
This paper provides implementations of 12 block ciphers on an ATMEL AVR ATtiny45 8-bit microcontroller, and makes the corresponding source code available on a web page, and evaluates performance figures of the implementations with respect to different metrics, including energy-consumption measurements and shows improvements compared to existing implementations.