Comparative Study of Block Ciphers Implementation for Resource-Constrained Devices (Review)
Keywords:Lightweight Block Ciphers, FPGA; Encryption; Decryption; Cryptography
Lightweight cryptography (LWC) is critical for securing data between devices with limited resources. In this paper, we look at hardware-based block ciphers (BCs). The block ciphers are thoroughly described using the Substitution permutation network (SPN) and Feistel network (FN) structures. A detailed summary of each SPN and FN-based BC is provided. Furthermore, the paper compares and thoroughly analyses the performance analysis of modern SPN and FN-based BCs. For each block cipher, performance measures such as chip area (slices), frequency, latency, throughput, and hardware efficiency are reviewed. The paper also recommends appropriate ciphers for the greatest and lowest performance indicators. Among BCs, the PRINCE cipher has minimal latency and great throughput. The research also reveals that the LED and PRESENT ciphers are more compact than other ciphers. The open research challenges are also presented with a forward-looking perspective.
Bhardwaj, A. Kumar, and M. Bansal, "A review on lightweight cryptography algorithms for data security and authentication in IoTs," in 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC), pp. 504-509, 2017, doi: 10.1109/ispcc.2017.8269731.
C. Pei, Y. Xiao, W. Liang, and X. Han, "Trade-off of security and performance of lightweight block ciphers in Industrial Wireless Sensor Networks," EURASIP J. Wirel. Commun. Netw, vol. 2018, no. 1, 2018, doi: 10.1186/s13638-018-1121-6.
B. J. Mohd, T. Hayajneh, and A. V. Vasilakos, "A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues," J. Netw. Comput. Appl., vol. 58, pp. 73–93, 2015, doi: 10.1016/j.jnca.2015.09.001.
E. R. Naru, H. Saini, and M. Sharma, "A recent review on lightweight cryptography in IoT," in 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), pp. 887-890, 2017, doi: 10.1109/i-smac.2017.8058307.
G. Hatzivasilis and K. Fysarakis, "Ioannis Papaefstathiou, and Charalampos Manifavas," A review of lightweight block ciphers, "Journal of Cryptographic Engineering, vol. 8, no. 2, pp. 141–184, 2018, doi: 10.1007/s13389-017-0160-y.
S. Surendran, A. Nassef, and B. D. Beheshti, "A survey of cryptographic algorithms for IoT devices," in 2018 IEEE Long Island Systems, Applications, and Technology Conference (LISAT), pp. 1-8, 2018, doi: 10.1109/lisat.2018.8378034.
Sevin and A. A. O. Mohammed, "A survey on software implementation of lightweight block ciphers for IoT devices," J. Ambient Intell. Humaniz. Comput., pp. 1-15, 2021, doi: 10.1007/s12652-021-03395-3.
Nayancy, S. Dutta, and S. Chakraborty, "A survey on implementation of lightweight block ciphers for resource constraints devices," J. Discrete Math. Sci. Cryptogr., vol. 25, no. 5, pp. 1377–1398, 2022, doi: 10.1080/09720502.2020.1766764.
L. Sliman, T. Omrani, Z. Tari, A. E. Samhat, and R. Rhouma, "Towards an ultra-lightweight block ciphers for Internet of Things," J. Inf. Secur. Appl., vol. 61, no. 102897, p. 102897, 2021, doi: 10.1016/j.jisa.2021.102897.
H. Luo, W. Chen, X. Ming and Y. Wu, "General Differential Fault Attack on PRESENT and GIFT Cipher With Nibble," in IEEE Access, vol. 9, pp. 37697-37706, 2021, doi: 10.1109/ACCESS.2021.3062665.
T. R. Lee, J. S. Teh, N. Jamil, J. L. S. Yan and J. Chen, "Lightweight Block Cipher Security Evaluation Based on Machine Learning Classifiers and Active S-Boxes," in IEEE Access, vol. 9, pp. 134052-134064, 2021, doi: 10.1109/ACCESS.2021.3116468.
M. F. Idris, J. S. Teh, J. L. S. Yan and W. -Z. Yeoh, "A Deep Learning Approach for Active S-Box Prediction of Lightweight Generalized Feistel Block Ciphers," in IEEE Access, vol. 9, pp. 104205-104216, 2021, doi: 10.1109/ACCESS.2021.3099802.
S. Muzaffar, O. T. Waheed, Z. Aung and I. M. Elfadel, "Lightweight, Single-Clock-Cycle, Multilayer Cipher for Single-Channel IoT Communication: Design and Implementation," in IEEE Access, vol. 9, pp. 66723-66737, 2021, doi: 10.1109/ACCESS.2021.3076468.
V. Yli-Mäyry et al., "Diffusional Side-Channel Leakage from Unrolled Lightweight Block Ciphers: A Case Study of Power Analysis on PRINCE," in IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1351-1364, 2021, doi: 10.1109/TIFS.2020.3033441.
S. Kim, J. Kim, S. Kim, D. Hong, J. Sung and S. Hong, "Integral Cryptanalysis of Lightweight Block Cipher PIPO," in IEEE Access, vol. 10, pp. 110195-110204, 2022, doi: 10.1109/ACCESS.2022.3214665.
F. E. Potestad-Ordóñez, E. Tena-Sánchez, A. J. Acosta-Jiménez, C. J. Jiménez-Fernández and R. Chaves, "Design and Evaluation of Countermeasures Against Fault Injection Attacks and Power Side-Channel Leakage Exploration for AES Block Cipher," in IEEE Access, vol. 10, pp. 65548-65561, 2022, doi: 10.1109/ACCESS.2022.3183764.
H. Xiao and L. Wang, "Differential Fault Analysis on the Key Schedule of the LBlock Algorithm," in IEEE Access, vol. 10, pp. 62402-62411, 2022, doi: 10.1109/ACCESS.2022.3181992.
S. An and S. C. Seo, "Designing a New XTS-AES Parallel Optimization Implementation Technique for Fast File Encryption," in IEEE Access, vol. 10, pp. 25349-25357, 2022, doi: 10.1109/ACCESS.2022.3155810.
R. Ghayoula, J. Fattahi, A. Smida, I. El Gmati, E. Pricop, and M. Ziadia, "FPGA Implementation of SIMON-128 Cryptographic Algorithm Using Artix-7," in 2022 14th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), 2022, doi: 10.1109/ecai54874.2022.9847520.
M. S. Ibrahim, Y.A, Abbas and M.H. Ali, "The performance of various lightweight block ciphers FPGA architectures: A review," Al-Iraqia Journal of Scientific Engineering Research, vol. 1, no. 1, 2022, doi: 10.33193/ijser.1.1.2022.43.
V. Agate, F. Concone, A. De Paola, P. Ferraro, G. L. Re and M. Morana, "Bayesian Modeling for Differential Cryptanalysis of Block Ciphers: A DES Instance," in IEEE Access, vol. 11, pp. 4809-4820, 2023, doi: 10.1109/ACCESS.2023.3236240.
L. Zhao, Y. Chi, Z. Xu and Z. Yue, "Block Cipher Identification Scheme Based on Hamming Weight Distribution," in IEEE Access, vol. 11, pp. 21364-21373, 2023, doi: 10.1109/ACCESS.2023.3249753.
R. Davis, "The data encryption standard in perspective," Commun. Soc., vol. 16, no. 6, pp. 5–9, 1978, doi: 10.1109/mcom.1978.1089771.
J. Nechvatal et al., "Report on the development of the Advanced Encryption Standard (AES)," J. Res. Natl. Inst. Stand. Technol., vol. 106, no. 3, pp. 511–577, 2001, doi: 10.6028/jres.106.023.
R. Rivest, A. Shamir, and L. Adelman, "A method for obtaining digital signatures and public-key cryptosystems (1978)," in Ideas That Created the Future, The MIT Press, pp. 463–474, 2021, doi: 10.7551/mitpress/12274.003.0047.
M. Amara and A. Siad, "Elliptic Curve Cryptography and its applications," International Workshop on Systems, Signal Processing and their Applications, WOSSPA, Tipaza, Algeria, 2011, pp. 247-250, doi: 10.1109/WOSSPA.2011.5931464.
U. M. Maurer, "Towards the equivalence of breaking the diffie-Hellman protocol and computing discrete logarithms," in Advances in Cryptology — CRYPTO '94, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 271–281, 2007, doi: 10.1007/3-540-48658-5_26.
A. Bogdanov et al., "PRESENT: An ultra-lightweight block cipher," in Cryptographic Hardware and Embedded Systems - CHES 2007, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 450–466, 2007, doi: 10.1007/978-3-540-74735-2_31.
L. Knudsen, G. Leander, A. Poschmann, and M. J. Robshaw, "PRINT cipher: a block cipher for IC-printing," in International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg: Springer, pp. 16–32, 2010, doi: 10.1007/978-3-642-15031-9_2.
J. Guo, T. Peyrin, A. Poschmann, and M. Robshaw, "The LED Block Cipher," in Cryptographic Hardware and Embedded Systems – CHES 2011, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 326–341, 2011, doi: 10.1007/978-3-642-23951-9_22.
Z. Gong, S. Nikova, and Y. W. Law, "KLEIN: A new family of lightweight block ciphers," in RFID. Security and Privacy, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 1–18, 2012, doi: 10.1007/978-3-642-25286-0_1.
D. Engels, M.-J. O. Saarinen, P. Schweitzer, and E. M. Smith, "The hummingbird-2 lightweight authenticated encryption algorithm," in RFID. Security and Privacy, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 19–31, 2012, doi: 10.1007/978-3-642-25286-0_2.
J. Borghoff, A. Canteaut, T. Güneysu, M. Elif Bilge Kavun, L. R. Knezevic, and G. Knudsen, "PRINCE-a low-latency block cipher for pervasive computing applications," in International conference on the theory and application of cryptology and information security, Berlin; Heidelberg: Springer, pp. 208–225, 2012, doi: 10.1007/978-3-642-34961-4_14.
W. Zhang, Z. Bao, D. Lin, V. Rijmen, B. Yang, and I. Verbauwhede, "RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms," Sci. China Inf. Sci., vol. 58, no. 12, pp. 1–15, 2015, doi: 10.1007/s11432-015-5459-7.
D. J. Wheeler and R. M. Needham, "TEA, a tiny encryption algorithm," in Fast Software Encryption, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 363–366, 1995, doi: 10.1007/3-540-60590-8_29.
J.-P. Kaps, "Chai-Tea, Cryptographic Hardware Implementations of xTEA," in Progress in Cryptology - INDOCRYPT 2008, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 363–375, 2008, doi: 10.1007/978-3-540-89754-5_28.
D. Hong et al., "HIGHT: A new block cipher suitable for low-resource device," in Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 46–59, 2006, doi: 10.1007/11894063_4.
C. Cannière, O. De, and M. Dunkelman, "KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers," in International Workshop on Cryptographic Hardware and Embedded Systems, Berlin, Heidelberg: Springer, pp. 272–288, 2009, doi: 10.1007/978-3-642-04138-9_20.
T. Shirai, K. Shibutani, T. Akishita, S. Moriai, and T. Iwata, "The 128-bit Block cipher CLEFIA (Extended Abstract)," FSE 2007. LNCS, vol. 4593, pp. 181–195, 2007, doi: 10.1007/978-3-540-74619-5_12.
W. Wu and L. Zhang, "LBlock: A Lightweight Block Cipher," in Applied Cryptography and Network Security, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 327–344, 2011, doi: 10.1007/978-3-642-21554-4_19.
R. Beaulieu, D. Shors, J. Smith, S. Treatman-Clark, B. Weeks, and L. Wingers, "The SIMON and SPECK families of lightweight block ciphers," cryptology eprint archive, 2013, doi: 10.1145/2744769.2747946.
S. P. Guruprasad and B. S. Chandrasekar, "An evaluation framework for security algorithms performance realization on FPGA," in 2018 IEEE International Conference on Current Trends in Advanced Computing (ICCTAC), vol. 1, no.5, pp. 1-6, 2018, doi: 10.1109/icctac.2018.8370396.
C. A. Lara-Nino, A. Diaz-Perez, and M. Morales-Sandoval, "Lightweight hardware architectures for the present cipher in FPGA," IEEE Trans. Circuits Syst. I Regul. Pap., vol. 64, no. 9, pp. 2544–2555, 2017, doi: 10.1109/tcsi.2017.2686783.
R. Bharathi and N. Parvatham, "Lightweight present block cipher model for IoT security on FPGA," Intell. Autom. Soft Comput., vol. 33, no. 1, pp. 35–49, 2022, doi: 10.32604/iasc.2022.020681.
B. Rashidi, "Flexible structures of lightweight block ciphers PRESENT, SIMON and LED," IET Circuits Devices Syst., vol. 14, no. 3, pp. 369–380, 2020, doi: 10.1049/iet-cds.2019.0363.
T. Okabe, "Efficient FPGA Implementations of PRINT CIPHER ," Journal of Emerging Technologies and Innovative Research, vol. 13, no. 4, pp. 76–85, 2016.
N. Nalla Anandakumar, T. Peyrin, and A. Poschmann, "A very compact FPGA implementation of LED and PHOTON," in Progress in Cryptology -- INDOCRYPT 2014, Cham: Springer International Publishing, pp. 304–321, 2014, doi: 10.1007/978-3-319-13039-2_18.
P. Singh, B. Acharya, and R. K. Chaurasiya, "High throughput architecture for KLEIN block cipher in FPGA," in 2019 9th Annual Information Technology, Electromechanical Engineering and Microelectronics Conference (IEMECON), pp. 64-69, 2019, doi: 10.1109/iemeconx.2019.8877021.
H. Krishnan and C. Babu, "Cryptanalysis of hummingbird algorithm with improved security and throughput," International Conference on VLSI Systems, Architecture, Technology, and Applications (VLSI-SATA), vol. 5, pp. 1–6, 2015, doi: 10.1109/VLSI-SATA.2015.7050460.
A. Abdullah and N. R. Obeid, "Efficient implementation for PRINCE algorithm in FPGA based on the BB84 protocol," J. Phys. Conf. Ser., vol. 1818, no. 1, p. 012216, 2021, doi: 10.1088/1742-6596/1818/1/012216.
S. Feizi, A. Nemati, A. Ahmadi, and V. A.-D. Makki, "A high-speed FPGA implementation of a Bit-slice Ultra-Lightweight block cipher, RECTANGLE," in 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 206-211, 2015, doi: 10.1109/iccke.2015.7365828.
J. G. Pandey, A. Laddha, and S. D. Samaddar, "A lightweight VLSI architecture for RECTANGLE cipher and its implementation on an FPGA," in 2020 24th International Symposium on VLSI Design and Test (VDAT), pp. 1-6. IEEE, 2020, doi: 10.1109/vdat50263.2020.9190623.
R. Anusha and V. Veena Devi Shastrimath, "LCBC-XTEA: High throughput lightweight cryptographic block cipher model for low-cost RFID systems," in Advances in Intelligent Systems and Computing, Cham: Springer International Publishing, pp. 185–196, 2019, doi: 10.1007/978-3-030-19813-8_20.
B. Rashidi, "High-throughput and lightweight hardware structures of HIGHT and PRESENT block ciphers," Microelectronics, vol. 90, pp. 232–252, 2019, doi: 10.1016/j.mejo.2019.06.012.
P. W. Shaikh and I. W. Damaj, "Analysis of pipelined KATAN ciphers under handle-C for FPGAs," in 2018 International Conference on Innovations in Information Technology (IIT), pp. 163-168, 2018, doi: 10.1109/innovations.2018.8606012.
X. Cheng, H. Zhu, Y. Xu, Y. Zhang, H. Xiao, and Z. Zhang, "A reconfigurable and compact hardware architecture of CLEFIA block cipher with multi-configuration," Microelectronics, vol. 114, no. 105144, p. 105144, 2021, doi: 10.1016/j.mejo.2021.105144.
K. R. Aljazeera, R. Nandakumar, and S. B. Ershad, "Design and characterization of LBlock cryptocore," in 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), pp. 166-172, 2016, doi: 10.1109/scopes.2016.7955732,
R. Sa'ed, J. Bassam, and M. Mohd, "FPGA modeling and optimization of a SIMON lightweight block cipher," Sensors, vol. 19, no. 4, 2019, doi: 10.3390/s19040913.
P. Ahir, M. Mozaffari-Kermani, and R. Azarderakhsh, "Lightweight architectures for reliable and fault detection Simon and Speck cryptographic algorithms on FPGA," ACM Trans. Embed. Comput. Syst., vol. 16, no. 4, pp. 1–17, 2017, doi: 10.1145/3055514.
R. Beaulieu, S. Treatman-Clark, D. Shors, B. Weeks, J. Smith and L. Wingers, "The SIMON and SPECK lightweight block ciphers," 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), San Francisco, CA, USA, 2015, pp. 1-6, doi: 10.1145/2744769.2747946.
Nemati, S. Feizi, A. Ahmadi, and V. A.-D. Makki, "A low-cost and flexible FPGA implementation for SPECK block Cipher," in 2015 12th International Iranian Society of Cryptology Conference on Information Security and Cryptology (ISCISC), vol. 7, no. 7 pp. 42-47, 2015., doi: 10.1109/iscisc.2015.7387896.
A. Kaur and G. Singh, "Encryption Algorithms based on Security in IoT (Internet of Things)," 2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), Solan, India, 2021, pp. 482-486, doi: 10.1109/ISPCC53510.2021.9609495.
R. S. Salman, A. K. Farhan, and A. Shakir, "Lightweight Modifications in the Advanced Encryption Standard (AES) for IoT Applications: A Comparative Survey," 2022 International Conference on Computer Science and Software Engineering (CSASE), Duhok, Iraq, 2022, pp. 325-330, doi: 10.1109/CSASE51777.2022.9759828.