ANU: an ultra lightweight cipher design for security in IoT

被引:27
作者
Bansod, Gaurav [1 ]
Patil, Abhijit [2 ]
Sutar, Swapnil [2 ]
Pisharoty, Narayan [3 ]
机构
[1] Pune Inst Comp Technol, Elect & Telecommun, Pune 412115, Maharashtra, India
[2] Symbiosis Inst Technol, Elect & Telecommun, Pune 412115, Maharashtra, India
[3] Glocal Univ, Elect & Telecommun, Saharanpur 2471001, India
关键词
lightweight cryptography; feistel cipher; block cipher; IoT; encryption; embedded security; ubiquitous computing; CRYPTANALYSIS;
D O I
10.1002/sec.1692
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an ultra lightweight cipher ANU. ANU is a balanced Feistel-based network. ANU supports 64 bit plaintext and 128/80 bit key length, and it has total 25 rounds. It needs only 1015 gate equivalents for 128 bit key length that is less as compared with all existing lightweight ciphers. Its memory size is minimal, and power consumption is very less. It needs only 22mW of dynamic power, while PRESENT cipher consumes 39mW of power. This paper furnishes the complete security analysis of the ANU cipher design. Our security analysis shows that ANU can attain ample security level against linear and differential cryptanalysis, biclique attack, zero-correlation attack, and algebraic attack. Biclique cryptanalysis provides maximal data complexity of 2(64). ANU cipher not only needs less gate equivalents but also it consumes very less power and has less memory requirement. ANU cipher is best suited for applications like Internet of Things. The design of ANU cipher will have a positive impact in the field of lightweight cryptography. Copyright (c) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:5238 / 5251
页数:14
相关论文
共 33 条
[1]  
Albrecht M, 2009, LECT NOTES COMPUT SC, V5665, P193, DOI 10.1007/978-3-642-03317-9_12
[2]  
Anderson Ross J., 1998, Serpent: A Proposal for the Advanced Encryption Standard
[3]  
[Anonymous], 2007, 128 BIT BLOCKC CLEF
[4]  
[Anonymous], FED INF PROC STAND P
[5]  
Beaulieu R., 2013, IACR CRYPTOLOGY EPRI
[6]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[7]  
Biham E., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P398
[8]  
Biham E., 1993, Differ. Cryptanal. Data Encrypt. Stand., DOI [10.1007/978-1-4613-9314-6, DOI 10.1007/978-1-4613-9314-6]
[9]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1807, P589
[10]  
Biryukov A., 2009, DISTINGUISHER RELATE