![]() LEA was originally designed for software implementation, but we aim to demonstrate that it is also efficient when implemented in hardware. This work is the first that studies a comprehensive hardware implementation of LEA. In this paper, we propose several methods to optimize LEA hardware for all key sizes and present implementation results in terms of time and chip area cost. Usually, small chip size and reasonably fast encryption is preferred for cryptographic hardware for small devices in resource constrained environments such as RFID tags or smart meters for smart grids. Further, it does not employ a complex operation such as S-Box, and only uses simple operations such as addition, rotation, and XOR (ARX). Every inner operation of the LEA is 32 bits wide, since 32-bit microprocessors are more popular than 8-bit ones these days. LEA has three key sizes of 128, 192, or 256 bits and a 128-bit block size. Therefore, it is extremely efficient when it is implemented in software. ![]() It is intended to have a small code size and consume low power. The focus of LEA design is a “software-oriented lightweightness” for resource-constrained small devices. Recently, the Electronics and Telecommunications Research Institute in Korea announced a new lightweight block cipher called LEA. optimized AES and reduced the gate count to 2,400 GE (gate equivalent). proposed a lightweight cipher LED, with a structure similar to AES, but it does not perform key scheduling.īoth lightweight block ciphers and methods to optimize legacy block ciphers have been studied. Two years later, HummingBird2, an improved version of HummingBird, was proposed. However, these algorithms have been revealed to be vulnerable to chosen-IV attacks and chosen message attacks. In the same year, Rotor-based Humming Bird was proposed by Revere Security. On the other hand KTANTAN is a fixed-key version of KATAN and has a different key scheduling scheme. KATAN divides plaintext into two parts and stores them into two registers, and the outputs from non-linear functions are stored in the least significant bit (LSB) of each other's register. In 2009, KATAN and KTANTAN were proposed by Cammoere et al. introduced PRESENT, which is comprised of substitution, permutation, and XOR. ![]() proposed a lightweight block cipher called HIGHT, which has a Feistel structure and operates with simple calculations such as XOR, addition, subtraction, and rotation. In 2005, Lim and Korkishko presented a lightweight block cipher called mCrypton that encrypts plaintext into ciphertext by using 4 by 4 nibble (4-bit) matrix-based simple operations such as substitution (S-Box), permutation, transposition, and key addition (XOR). Techniques for securing resource-constrained devices such as RFID (Radio-frequency Identification) tags have been proposed. One of the essential ingredients of smart device security is a block cipher, and lightweight energy-efficient implementation techniques are required for small mobile devices. The use of small mobile devices is growing explosively, and the importance of security is increasing daily. Recent improvements in semi-conductor technology have enabled the computing environment to become mobile, and accelerated the change to a ubiquitous era. Even though LEA was originally targeted at software efficiency, it also shows high efficiency when implemented as hardware. We present various hardware structures and their implementation results according to key sizes. To the best of our knowledge, this paper is the first report on a comprehensive hardware implementation of LEA. In addition, the algorithm is comprised of not complex S-Box-like structures but simple Addition, Rotation, and XOR operations. To reflect on recent technology, all required calculations utilize 32-bit wide operations. LEA was originally targeted for efficient implementation on microprocessors, as it is fast when implemented in software and furthermore, it has a small memory footprint. Recently, a lightweight block cipher called LEA was proposed. A lightweight encryption algorithm is essential for secure communication between these kinds of resource-constrained devices, and many researchers have been investigating this field. Because our daily life is deeply intertwined with ubiquitous networks, the importance of security is growing. ![]() Recently, due to the advent of resource-constrained trends, such as smartphones and smart devices, the computing environment is changing.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |