Compact Implementations of LEA Block Cipher for Low-End Microprocessors View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Hwajeong Seo , Zhe Liu , Jongseok Choi , Taehwan Park , Howon Kim

ABSTRACT

In WISA’13, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are realized in several platforms for practical usage with high performance and low overheads. In this paper, we further improve 128-, 192- and 256-bit LEA encryption for low-end embedded processors. Firstly we present speed optimization methods. The methods split a 32-bit word operation into four byte-wise operations and avoid several rotation operations by taking advantages of efficient byte-wise rotations. Secondly we reduce the code size to ensure minimum code size. We find the minimum inner loops and optimize them in an instruction set level. After then we construct the whole algorithm in a partly unrolled fashion with reasonable speed. Finally, we achieved the fastest LEA implementations, which improves performance by 10.9 % than previous best known results. For size optimization, our implementation only occupies the 280B to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, compared with other state-of-art ARX block ciphers such as SPECK and SIMON. More... »

PAGES

28-40

References to SciGraph publications

  • 2014. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors in INFORMATION SECURITY APPLICATIONS
  • 2014. Parallel Implementations of LEA in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2012. High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller in PROGRESS IN CRYPTOLOGY – LATINCRYPT 2012
  • 2010. Fast Software AES Encryption in FAST SOFTWARE ENCRYPTION
  • 2015. The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers in LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
  • Book

    TITLE

    Information Security Applications

    ISBN

    978-3-319-31874-5
    978-3-319-31875-2

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3

    DOI

    http://dx.doi.org/10.1007/978-3-319-31875-2_3

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1017411533


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Seo", 
            "givenName": "Hwajeong", 
            "id": "sg:person.015101423711.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Luxembourg", 
              "id": "https://www.grid.ac/institutes/grid.16008.3f", 
              "name": [
                "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Zhe", 
            "id": "sg:person.013144776623.84", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Choi", 
            "givenName": "Jongseok", 
            "id": "sg:person.016515567115.78", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Park", 
            "givenName": "Taehwan", 
            "id": "sg:person.014133561767.73", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kim", 
            "givenName": "Howon", 
            "id": "sg:person.010610076315.82", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-33481-8_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023941760", 
              "https://doi.org/10.1007/978-3-642-33481-8_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046316812", 
              "https://doi.org/10.1007/978-3-642-13858-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046316812", 
              "https://doi.org/10.1007/978-3-642-13858-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16363-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049093977", 
              "https://doi.org/10.1007/978-3-319-16363-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-12160-4_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053203922", 
              "https://doi.org/10.1007/978-3-319-12160-4_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-05149-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053702235", 
              "https://doi.org/10.1007/978-3-319-05149-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3934/amc.2010.4.169", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1071730649"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2016", 
        "datePublishedReg": "2016-01-01", 
        "description": "In WISA\u201913, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are realized in several platforms for practical usage with high performance and low overheads. In this paper, we further improve 128-, 192- and 256-bit LEA encryption for low-end embedded processors. Firstly we present speed optimization methods. The methods split a 32-bit word operation into four byte-wise operations and avoid several rotation operations by taking advantages of efficient byte-wise rotations. Secondly we reduce the code size to ensure minimum code size. We find the minimum inner loops and optimize them in an instruction set level. After then we construct the whole algorithm in a partly unrolled fashion with reasonable speed. Finally, we achieved the fastest LEA implementations, which improves performance by 10.9\u00a0% than previous best known results. For size optimization, our implementation only occupies the 280B to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, compared with other state-of-art ARX block ciphers such as SPECK and SIMON.", 
        "editor": [
          {
            "familyName": "Kim", 
            "givenName": "Ho-won", 
            "type": "Person"
          }, 
          {
            "familyName": "Choi", 
            "givenName": "Dooho", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-31875-2_3", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-31874-5", 
            "978-3-319-31875-2"
          ], 
          "name": "Information Security Applications", 
          "type": "Book"
        }, 
        "name": "Compact Implementations of LEA Block Cipher for Low-End Microprocessors", 
        "pagination": "28-40", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-31875-2_3"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "52f4954ef1f0eb4ef988cf876312fec1917210e74d71e9840396a4cc3c6f9047"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1017411533"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-31875-2_3", 
          "https://app.dimensions.ai/details/publication/pub.1017411533"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T15:20", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8672_00000253.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-31875-2_3"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'


     

    This table displays all metadata directly associated to this object as RDF triples.

    124 TRIPLES      23 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-31875-2_3 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author Nc93145554c9b4a95a2ffd94f6ea202e0
    4 schema:citation sg:pub.10.1007/978-3-319-05149-9_1
    5 sg:pub.10.1007/978-3-319-12160-4_16
    6 sg:pub.10.1007/978-3-319-16363-5_1
    7 sg:pub.10.1007/978-3-642-13858-4_5
    8 sg:pub.10.1007/978-3-642-33481-8_16
    9 https://doi.org/10.3934/amc.2010.4.169
    10 schema:datePublished 2016
    11 schema:datePublishedReg 2016-01-01
    12 schema:description In WISA’13, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are realized in several platforms for practical usage with high performance and low overheads. In this paper, we further improve 128-, 192- and 256-bit LEA encryption for low-end embedded processors. Firstly we present speed optimization methods. The methods split a 32-bit word operation into four byte-wise operations and avoid several rotation operations by taking advantages of efficient byte-wise rotations. Secondly we reduce the code size to ensure minimum code size. We find the minimum inner loops and optimize them in an instruction set level. After then we construct the whole algorithm in a partly unrolled fashion with reasonable speed. Finally, we achieved the fastest LEA implementations, which improves performance by 10.9 % than previous best known results. For size optimization, our implementation only occupies the 280B to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, compared with other state-of-art ARX block ciphers such as SPECK and SIMON.
    13 schema:editor N08c5e94dd0a44bdc87e425fe45ddcc75
    14 schema:genre chapter
    15 schema:inLanguage en
    16 schema:isAccessibleForFree false
    17 schema:isPartOf Nc638b96b707247a68706d7d97261ef62
    18 schema:name Compact Implementations of LEA Block Cipher for Low-End Microprocessors
    19 schema:pagination 28-40
    20 schema:productId Nd279cad520414c3d8490dbe4d59433eb
    21 Nd6c27ed7cad64e149e03ae32025ab0fa
    22 Nddd99605ed5443cb895cd19c3b9bbaac
    23 schema:publisher Ndd6d557d1dd74656b9bf18ef12ebc448
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017411533
    25 https://doi.org/10.1007/978-3-319-31875-2_3
    26 schema:sdDatePublished 2019-04-15T15:20
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher N399f4634e8b647c5a774329fc2694c13
    29 schema:url http://link.springer.com/10.1007/978-3-319-31875-2_3
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset chapters
    32 rdf:type schema:Chapter
    33 N08c5e94dd0a44bdc87e425fe45ddcc75 rdf:first Ne45f06b8e9784d899ea510ca51f831b4
    34 rdf:rest N40ac2916165f4d5c827059d061985608
    35 N16504f9f797644ff813c40e3f4b35a5a rdf:first sg:person.016515567115.78
    36 rdf:rest Na729221b3bf749aebbcf5e9065724fd2
    37 N399f4634e8b647c5a774329fc2694c13 schema:name Springer Nature - SN SciGraph project
    38 rdf:type schema:Organization
    39 N40ac2916165f4d5c827059d061985608 rdf:first Ndea22512b7dd430a8bdfea198cf79a73
    40 rdf:rest rdf:nil
    41 N5fb5ab917f3b4de79d1ab9bb6d38fa27 rdf:first sg:person.013144776623.84
    42 rdf:rest N16504f9f797644ff813c40e3f4b35a5a
    43 N69f72aae5d4448fc8b42098515bb9ddd rdf:first sg:person.010610076315.82
    44 rdf:rest rdf:nil
    45 Na729221b3bf749aebbcf5e9065724fd2 rdf:first sg:person.014133561767.73
    46 rdf:rest N69f72aae5d4448fc8b42098515bb9ddd
    47 Nc638b96b707247a68706d7d97261ef62 schema:isbn 978-3-319-31874-5
    48 978-3-319-31875-2
    49 schema:name Information Security Applications
    50 rdf:type schema:Book
    51 Nc93145554c9b4a95a2ffd94f6ea202e0 rdf:first sg:person.015101423711.26
    52 rdf:rest N5fb5ab917f3b4de79d1ab9bb6d38fa27
    53 Nd279cad520414c3d8490dbe4d59433eb schema:name readcube_id
    54 schema:value 52f4954ef1f0eb4ef988cf876312fec1917210e74d71e9840396a4cc3c6f9047
    55 rdf:type schema:PropertyValue
    56 Nd6c27ed7cad64e149e03ae32025ab0fa schema:name dimensions_id
    57 schema:value pub.1017411533
    58 rdf:type schema:PropertyValue
    59 Ndd6d557d1dd74656b9bf18ef12ebc448 schema:location Cham
    60 schema:name Springer International Publishing
    61 rdf:type schema:Organisation
    62 Nddd99605ed5443cb895cd19c3b9bbaac schema:name doi
    63 schema:value 10.1007/978-3-319-31875-2_3
    64 rdf:type schema:PropertyValue
    65 Ndea22512b7dd430a8bdfea198cf79a73 schema:familyName Choi
    66 schema:givenName Dooho
    67 rdf:type schema:Person
    68 Ne45f06b8e9784d899ea510ca51f831b4 schema:familyName Kim
    69 schema:givenName Ho-won
    70 rdf:type schema:Person
    71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    72 schema:name Information and Computing Sciences
    73 rdf:type schema:DefinedTerm
    74 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Computer Software
    76 rdf:type schema:DefinedTerm
    77 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    78 schema:familyName Kim
    79 schema:givenName Howon
    80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
    81 rdf:type schema:Person
    82 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
    83 schema:familyName Liu
    84 schema:givenName Zhe
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
    86 rdf:type schema:Person
    87 sg:person.014133561767.73 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    88 schema:familyName Park
    89 schema:givenName Taehwan
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73
    91 rdf:type schema:Person
    92 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    93 schema:familyName Seo
    94 schema:givenName Hwajeong
    95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
    96 rdf:type schema:Person
    97 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    98 schema:familyName Choi
    99 schema:givenName Jongseok
    100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
    101 rdf:type schema:Person
    102 sg:pub.10.1007/978-3-319-05149-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053702235
    103 https://doi.org/10.1007/978-3-319-05149-9_1
    104 rdf:type schema:CreativeWork
    105 sg:pub.10.1007/978-3-319-12160-4_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053203922
    106 https://doi.org/10.1007/978-3-319-12160-4_16
    107 rdf:type schema:CreativeWork
    108 sg:pub.10.1007/978-3-319-16363-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049093977
    109 https://doi.org/10.1007/978-3-319-16363-5_1
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/978-3-642-13858-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046316812
    112 https://doi.org/10.1007/978-3-642-13858-4_5
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-642-33481-8_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023941760
    115 https://doi.org/10.1007/978-3-642-33481-8_16
    116 rdf:type schema:CreativeWork
    117 https://doi.org/10.3934/amc.2010.4.169 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071730649
    118 rdf:type schema:CreativeWork
    119 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
    120 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg
    121 rdf:type schema:Organization
    122 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
    123 schema:name School of Computer Science and Engineering, Pusan National University
    124 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...