Compact Implementations of LEA Block Cipher for Low-End Microprocessors View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2016

AUTHORS

Hwajeong Seo , Zhe Liu , Jongseok Choi , Taehwan Park , Howon Kim

ABSTRACT

In WISA’13, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are realized in several platforms for practical usage with high performance and low overheads. In this paper, we further improve 128-, 192- and 256-bit LEA encryption for low-end embedded processors. Firstly we present speed optimization methods. The methods split a 32-bit word operation into four byte-wise operations and avoid several rotation operations by taking advantages of efficient byte-wise rotations. Secondly we reduce the code size to ensure minimum code size. We find the minimum inner loops and optimize them in an instruction set level. After then we construct the whole algorithm in a partly unrolled fashion with reasonable speed. Finally, we achieved the fastest LEA implementations, which improves performance by 10.9 % than previous best known results. For size optimization, our implementation only occupies the 280B to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, compared with other state-of-art ARX block ciphers such as SPECK and SIMON. More... »

PAGES

28-40

References to SciGraph publications

  • 2014. LEA: A 128-Bit Block Cipher for Fast Encryption on Common Processors in INFORMATION SECURITY APPLICATIONS
  • 2014. Parallel Implementations of LEA in INFORMATION SECURITY AND CRYPTOLOGY -- ICISC 2013
  • 2012. High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller in PROGRESS IN CRYPTOLOGY – LATINCRYPT 2012
  • 2010. Fast Software AES Encryption in FAST SOFTWARE ENCRYPTION
  • 2015. The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers in LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY
  • Book

    TITLE

    Information Security Applications

    ISBN

    978-3-319-31874-5
    978-3-319-31875-2

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3

    DOI

    http://dx.doi.org/10.1007/978-3-319-31875-2_3

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1017411533


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computer Software", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Seo", 
            "givenName": "Hwajeong", 
            "id": "sg:person.015101423711.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "University of Luxembourg", 
              "id": "https://www.grid.ac/institutes/grid.16008.3f", 
              "name": [
                "Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Liu", 
            "givenName": "Zhe", 
            "id": "sg:person.013144776623.84", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Choi", 
            "givenName": "Jongseok", 
            "id": "sg:person.016515567115.78", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Park", 
            "givenName": "Taehwan", 
            "id": "sg:person.014133561767.73", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Pusan National University", 
              "id": "https://www.grid.ac/institutes/grid.262229.f", 
              "name": [
                "School of Computer Science and Engineering, Pusan National University"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Kim", 
            "givenName": "Howon", 
            "id": "sg:person.010610076315.82", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-33481-8_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1023941760", 
              "https://doi.org/10.1007/978-3-642-33481-8_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046316812", 
              "https://doi.org/10.1007/978-3-642-13858-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13858-4_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046316812", 
              "https://doi.org/10.1007/978-3-642-13858-4_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-16363-5_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1049093977", 
              "https://doi.org/10.1007/978-3-319-16363-5_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-12160-4_16", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053203922", 
              "https://doi.org/10.1007/978-3-319-12160-4_16"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-05149-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053702235", 
              "https://doi.org/10.1007/978-3-319-05149-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.3934/amc.2010.4.169", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1071730649"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2016", 
        "datePublishedReg": "2016-01-01", 
        "description": "In WISA\u201913, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are realized in several platforms for practical usage with high performance and low overheads. In this paper, we further improve 128-, 192- and 256-bit LEA encryption for low-end embedded processors. Firstly we present speed optimization methods. The methods split a 32-bit word operation into four byte-wise operations and avoid several rotation operations by taking advantages of efficient byte-wise rotations. Secondly we reduce the code size to ensure minimum code size. We find the minimum inner loops and optimize them in an instruction set level. After then we construct the whole algorithm in a partly unrolled fashion with reasonable speed. Finally, we achieved the fastest LEA implementations, which improves performance by 10.9\u00a0% than previous best known results. For size optimization, our implementation only occupies the 280B to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, compared with other state-of-art ARX block ciphers such as SPECK and SIMON.", 
        "editor": [
          {
            "familyName": "Kim", 
            "givenName": "Ho-won", 
            "type": "Person"
          }, 
          {
            "familyName": "Choi", 
            "givenName": "Dooho", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-31875-2_3", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-31874-5", 
            "978-3-319-31875-2"
          ], 
          "name": "Information Security Applications", 
          "type": "Book"
        }, 
        "name": "Compact Implementations of LEA Block Cipher for Low-End Microprocessors", 
        "pagination": "28-40", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-31875-2_3"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "52f4954ef1f0eb4ef988cf876312fec1917210e74d71e9840396a4cc3c6f9047"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1017411533"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-31875-2_3", 
          "https://app.dimensions.ai/details/publication/pub.1017411533"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T15:20", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8672_00000253.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-31875-2_3"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-31875-2_3'


     

    This table displays all metadata directly associated to this object as RDF triples.

    124 TRIPLES      23 PREDICATES      33 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-31875-2_3 schema:about anzsrc-for:08
    2 anzsrc-for:0803
    3 schema:author N444bb137fbd74e2dbb6976db4d78155d
    4 schema:citation sg:pub.10.1007/978-3-319-05149-9_1
    5 sg:pub.10.1007/978-3-319-12160-4_16
    6 sg:pub.10.1007/978-3-319-16363-5_1
    7 sg:pub.10.1007/978-3-642-13858-4_5
    8 sg:pub.10.1007/978-3-642-33481-8_16
    9 https://doi.org/10.3934/amc.2010.4.169
    10 schema:datePublished 2016
    11 schema:datePublishedReg 2016-01-01
    12 schema:description In WISA’13, a novel lightweight block cipher named LEA was released. This algorithm has certain useful features for hardware and software implementations, i.e., simple ARX operations, non-S-box architecture, and 32-bit word size. These features are realized in several platforms for practical usage with high performance and low overheads. In this paper, we further improve 128-, 192- and 256-bit LEA encryption for low-end embedded processors. Firstly we present speed optimization methods. The methods split a 32-bit word operation into four byte-wise operations and avoid several rotation operations by taking advantages of efficient byte-wise rotations. Secondly we reduce the code size to ensure minimum code size. We find the minimum inner loops and optimize them in an instruction set level. After then we construct the whole algorithm in a partly unrolled fashion with reasonable speed. Finally, we achieved the fastest LEA implementations, which improves performance by 10.9 % than previous best known results. For size optimization, our implementation only occupies the 280B to conduct LEA encryption. After scaling, our implementation achieved the smallest ARX implementations so far, compared with other state-of-art ARX block ciphers such as SPECK and SIMON.
    13 schema:editor Neef2ddcb7e294bb08c0ce4e06947562b
    14 schema:genre chapter
    15 schema:inLanguage en
    16 schema:isAccessibleForFree false
    17 schema:isPartOf Nc02b39aa3eb44604acba0adea1c95d58
    18 schema:name Compact Implementations of LEA Block Cipher for Low-End Microprocessors
    19 schema:pagination 28-40
    20 schema:productId N5594d92a4b1040b0ac5fc21ad8ebea54
    21 Nd3d087df1e3b44dda9267147a8a9bbfd
    22 Ne53b9e2141cb47e7941716cf875babb6
    23 schema:publisher N6eb680930852425299da150633709b7e
    24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017411533
    25 https://doi.org/10.1007/978-3-319-31875-2_3
    26 schema:sdDatePublished 2019-04-15T15:20
    27 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    28 schema:sdPublisher N74b876c159214b529d3272b12cad9c7f
    29 schema:url http://link.springer.com/10.1007/978-3-319-31875-2_3
    30 sgo:license sg:explorer/license/
    31 sgo:sdDataset chapters
    32 rdf:type schema:Chapter
    33 N444bb137fbd74e2dbb6976db4d78155d rdf:first sg:person.015101423711.26
    34 rdf:rest N4c8c1f5fecc44b4abc3d296caacf7102
    35 N4c8c1f5fecc44b4abc3d296caacf7102 rdf:first sg:person.013144776623.84
    36 rdf:rest N705be7a4f969487cabbcd9408f8d006e
    37 N4e707c62b61f446983f04f8697fa50a8 rdf:first sg:person.014133561767.73
    38 rdf:rest N5c66d37e3c4e4e69851608c1fa93d075
    39 N5594d92a4b1040b0ac5fc21ad8ebea54 schema:name readcube_id
    40 schema:value 52f4954ef1f0eb4ef988cf876312fec1917210e74d71e9840396a4cc3c6f9047
    41 rdf:type schema:PropertyValue
    42 N5c66d37e3c4e4e69851608c1fa93d075 rdf:first sg:person.010610076315.82
    43 rdf:rest rdf:nil
    44 N6eb680930852425299da150633709b7e schema:location Cham
    45 schema:name Springer International Publishing
    46 rdf:type schema:Organisation
    47 N705be7a4f969487cabbcd9408f8d006e rdf:first sg:person.016515567115.78
    48 rdf:rest N4e707c62b61f446983f04f8697fa50a8
    49 N74b876c159214b529d3272b12cad9c7f schema:name Springer Nature - SN SciGraph project
    50 rdf:type schema:Organization
    51 N7b931eee397b4d219951b1c77959b51e schema:familyName Choi
    52 schema:givenName Dooho
    53 rdf:type schema:Person
    54 Nb4b4f202bf5f4b56b39401b6b910a63a rdf:first N7b931eee397b4d219951b1c77959b51e
    55 rdf:rest rdf:nil
    56 Nc02b39aa3eb44604acba0adea1c95d58 schema:isbn 978-3-319-31874-5
    57 978-3-319-31875-2
    58 schema:name Information Security Applications
    59 rdf:type schema:Book
    60 Nc92ebbf0af034a7c9cc6372e1e0fba8b schema:familyName Kim
    61 schema:givenName Ho-won
    62 rdf:type schema:Person
    63 Nd3d087df1e3b44dda9267147a8a9bbfd schema:name doi
    64 schema:value 10.1007/978-3-319-31875-2_3
    65 rdf:type schema:PropertyValue
    66 Ne53b9e2141cb47e7941716cf875babb6 schema:name dimensions_id
    67 schema:value pub.1017411533
    68 rdf:type schema:PropertyValue
    69 Neef2ddcb7e294bb08c0ce4e06947562b rdf:first Nc92ebbf0af034a7c9cc6372e1e0fba8b
    70 rdf:rest Nb4b4f202bf5f4b56b39401b6b910a63a
    71 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    72 schema:name Information and Computing Sciences
    73 rdf:type schema:DefinedTerm
    74 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
    75 schema:name Computer Software
    76 rdf:type schema:DefinedTerm
    77 sg:person.010610076315.82 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    78 schema:familyName Kim
    79 schema:givenName Howon
    80 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010610076315.82
    81 rdf:type schema:Person
    82 sg:person.013144776623.84 schema:affiliation https://www.grid.ac/institutes/grid.16008.3f
    83 schema:familyName Liu
    84 schema:givenName Zhe
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013144776623.84
    86 rdf:type schema:Person
    87 sg:person.014133561767.73 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    88 schema:familyName Park
    89 schema:givenName Taehwan
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014133561767.73
    91 rdf:type schema:Person
    92 sg:person.015101423711.26 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    93 schema:familyName Seo
    94 schema:givenName Hwajeong
    95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015101423711.26
    96 rdf:type schema:Person
    97 sg:person.016515567115.78 schema:affiliation https://www.grid.ac/institutes/grid.262229.f
    98 schema:familyName Choi
    99 schema:givenName Jongseok
    100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016515567115.78
    101 rdf:type schema:Person
    102 sg:pub.10.1007/978-3-319-05149-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053702235
    103 https://doi.org/10.1007/978-3-319-05149-9_1
    104 rdf:type schema:CreativeWork
    105 sg:pub.10.1007/978-3-319-12160-4_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053203922
    106 https://doi.org/10.1007/978-3-319-12160-4_16
    107 rdf:type schema:CreativeWork
    108 sg:pub.10.1007/978-3-319-16363-5_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1049093977
    109 https://doi.org/10.1007/978-3-319-16363-5_1
    110 rdf:type schema:CreativeWork
    111 sg:pub.10.1007/978-3-642-13858-4_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046316812
    112 https://doi.org/10.1007/978-3-642-13858-4_5
    113 rdf:type schema:CreativeWork
    114 sg:pub.10.1007/978-3-642-33481-8_16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1023941760
    115 https://doi.org/10.1007/978-3-642-33481-8_16
    116 rdf:type schema:CreativeWork
    117 https://doi.org/10.3934/amc.2010.4.169 schema:sameAs https://app.dimensions.ai/details/publication/pub.1071730649
    118 rdf:type schema:CreativeWork
    119 https://www.grid.ac/institutes/grid.16008.3f schema:alternateName University of Luxembourg
    120 schema:name Laboratory of Algorithmics, Cryptology and Security (LACS), University of Luxembourg
    121 rdf:type schema:Organization
    122 https://www.grid.ac/institutes/grid.262229.f schema:alternateName Pusan National University
    123 schema:name School of Computer Science and Engineering, Pusan National University
    124 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...