Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor
Recently, many lightweight block ciphers are proposed, such as PRESENT, SIMON, SPECK, Simeck, SPARX, GIFT, and CHAM. Most of these ciphers are designed with Addition–Rotation–Xor (ARX)-based structure for the resource-constrained environment because ARX operations can be implemented efficiently, esp...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
SAGE Publishing
2019-09-01
|
Series: | International Journal of Distributed Sensor Networks |
Online Access: | https://doi.org/10.1177/1550147719874180 |
id |
doaj-f12cb4868945495bac43f92c05cb2ac6 |
---|---|
record_format |
Article |
spelling |
doaj-f12cb4868945495bac43f92c05cb2ac62020-11-25T03:54:35ZengSAGE PublishingInternational Journal of Distributed Sensor Networks1550-14772019-09-011510.1177/1550147719874180Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processorByoungjin SeokChanghoon LeeRecently, many lightweight block ciphers are proposed, such as PRESENT, SIMON, SPECK, Simeck, SPARX, GIFT, and CHAM. Most of these ciphers are designed with Addition–Rotation–Xor (ARX)-based structure for the resource-constrained environment because ARX operations can be implemented efficiently, especially in software. However, if the word size of a block cipher is smaller than the register size of the target device, it may process inefficiently in the aspect of memory usage. In this article, we present a fast implementation method for ARX-based block ciphers, named two-way operation. Moreover, also we applied SPARX-64/128 and CHAM-64/128 and estimated the performance in terms of execution time (cycles per byte) on a 32-bit Advanced RISC Machines processor. As a result, we achieved a large amount of improvement in execution time. The cycles of round function and key schedule are reduced by 53.31% and 31.51% for SPARX-64/128 and 41.22% and 19.40% for CHAM-64/128.https://doi.org/10.1177/1550147719874180 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Byoungjin Seok Changhoon Lee |
spellingShingle |
Byoungjin Seok Changhoon Lee Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor International Journal of Distributed Sensor Networks |
author_facet |
Byoungjin Seok Changhoon Lee |
author_sort |
Byoungjin Seok |
title |
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor |
title_short |
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor |
title_full |
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor |
title_fullStr |
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor |
title_full_unstemmed |
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor |
title_sort |
fast implementations of arx-based lightweight block ciphers (sparx, cham) on 32-bit processor |
publisher |
SAGE Publishing |
series |
International Journal of Distributed Sensor Networks |
issn |
1550-1477 |
publishDate |
2019-09-01 |
description |
Recently, many lightweight block ciphers are proposed, such as PRESENT, SIMON, SPECK, Simeck, SPARX, GIFT, and CHAM. Most of these ciphers are designed with Addition–Rotation–Xor (ARX)-based structure for the resource-constrained environment because ARX operations can be implemented efficiently, especially in software. However, if the word size of a block cipher is smaller than the register size of the target device, it may process inefficiently in the aspect of memory usage. In this article, we present a fast implementation method for ARX-based block ciphers, named two-way operation. Moreover, also we applied SPARX-64/128 and CHAM-64/128 and estimated the performance in terms of execution time (cycles per byte) on a 32-bit Advanced RISC Machines processor. As a result, we achieved a large amount of improvement in execution time. The cycles of round function and key schedule are reduced by 53.31% and 31.51% for SPARX-64/128 and 41.22% and 19.40% for CHAM-64/128. |
url |
https://doi.org/10.1177/1550147719874180 |
work_keys_str_mv |
AT byoungjinseok fastimplementationsofarxbasedlightweightblockcipherssparxchamon32bitprocessor AT changhoonlee fastimplementationsofarxbasedlightweightblockcipherssparxchamon32bitprocessor |
_version_ |
1724472882798526464 |