Skip to main content

Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher

  • Conference paper
  • First Online:
Advances in Cyber Security (ACeS 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1347))

Included in the following conference series:

Abstract

Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption algorithm. RECTANGLE block cipher is very efficient in terms of encryption speed performance among the existing lightweight algorithms. However, its non-robust round keys generation seems to be the weakest point of the algorithm. A robust key schedule algorithm should produce round keys with random characteristics, independent, and not correlated to one another as defined in the randomization and confusion properties. Therefore, the objective of this paper is to improve the RECTANGLE key schedule algorithm to increase its randomization and confusion properties against high correlation keys as well as the speed and throughput performances. Three experiments were conducted based on the randomness, key sensitivity, and performance tests. The results show that our modified designs have produced lower correlation keys by 0.16% to 0.45% improvement, more random ciphertext with an increase of 13.34% to 20.00% passing rate, and better performance that recorded 1.30% to 7.82% faster and increased by 1.33% to 8.50% throughput than the original RECTANGLE.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Baysal, A., Şahin, S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Güneysu, T., Leander, G., Moradi, A. (eds.) Lightweight Cryptography for Security and Privacy. LightSec 2015. Lecture Notes in Computer Science, vol. 9542, pp. 58–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_4

  2. Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12), 1–5 (2015). https://doi.org/10.1007/s11432-015-5459-7

  3. Li, L., Liu, B., Wang, H.: QTL: a new ultra-lightweight block cipher. Microprocess. Microsyst. 45, 45–55 (2016)

    Article  Google Scholar 

  4. Beierle, C. et al.: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology – CRYPTO 2016. CRYPTO 2016. Lecture Notes in Computer Science, vol. 9815, pp. 123–153. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53008-5_5

  5. Bansod, G., Pisharoty, N., Patil, A.: BORON: an ultra-lightweight and low power encryption design for pervasive computing. Front. Inf. Technol. Electron. Eng. 18(3), 317–331 (2017). https://doi.org/10.1631/FITEE.1500415

  6. Usman, M., Ahmed, I., Imran, M., Khan, S., Ali, U.: SIT: a lightweight encryption algorithm for secure Internet of Things. Int. J. Adv. Comput. Sci. Appl. 8(1), 402–411 (2017)

    Google Scholar 

  7. Bansod, G., Pisharoty, N., Patil, A.: MANTRA: an ultra lightweight cipher design for ubiquitous computing. Int. J. Ad Hoc Ubiquitous Comput. 28(1), 13–26 (2018)

    Article  Google Scholar 

  8. Li, L., Liu, B., Zhou, Y., Zou, Y.: SFN: a new lightweight block cipher. Microprocess. Microsyst. 60, 138–150 (2018)

    Article  Google Scholar 

  9. Beierle, C., Leander, G., Moradi, A., Rasoolzadeh, S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 1, 5–45 (2019)

    Google Scholar 

  10. Liu, B.T., Li, L., Wu, R.X., Xie, M.M., Li, Q.P.: Loong: a family of involutional lightweight block cipher based on SPN structure. IEEE Access 7, 136023–136035 (2019)

    Article  Google Scholar 

  11. Biswas, A., Majumdar, A., Nath, S., Dutta, A., Baishnab, K. L.: LRBC: a lightweight block cipher design for resource constrained IoT devices. J. Ambient Intell. Hum. Comput., 1–15 (2020). https://doi.org/10.1007/s12652-020-01694-9

  12. Yeoh, W.Z., Teh, J.S., Sazali, M.I.S.B.M.: µ2: a Lightweight block cipher. In: Alfred, R., Lim, Y., Haviluddin, H., On, C. (eds.) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol. 603, pp. 281–290. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0058-9_27

  13. Senol, A.: Improved differential attacks on rectangle. Master’s thesis, Middle East Technical University (2017)

    Google Scholar 

  14. Yan, H., Luo, Y., Chen, M., Lai, X.: New observation on the key schedule of RECTANGLE. Sci. China Inf. Sci. 62(3), 1–3 (2019). https://doi.org/10.1007/s11432-018-9527-8

    Article  Google Scholar 

  15. Afzal, S., Waqas, U., Mir, M. A., Yousaf, M.: Statistical analysis of key schedule algorithms of different block ciphers. Sci. Int. 27(3), 1835–1839 (2015)

    Google Scholar 

  16. Derbez, P., Fouque, P.A.., Jean, J., Lambin, B.: Variants of the AES Key schedule for better truncated differential bounds. In: Cid, C., Jacobson, Jr., M. (eds.) Selected Areas in Cryptography – SAC 2018. SAC 2018. Lecture Notes in Computer Science, vol. 11349, pp. 27–49. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-10970-7_2

  17. Hussien, H.M., Muda, Z., Yasin, S.M.: New key expansion function of Rijndael 128-bit resistance to the related-key attacks. J. Inf. Commun. Technol. 19(3), 409–434 (2018)

    Google Scholar 

  18. Guo, C., Wang, L.: Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. In: Peyrin, T., Galbraith, S. (eds) Advances in Cryptology – ASIACRYPT 2018. ASIACRYPT 2018. Lecture Notes in Computer Science, vol. 11272, pp. 213–243. Springer, Cham. https://doi.org/10.1007/978-3-030-03326-2_8

  19. De Los Reyes, E.M., Sison, A.M., Medina, R.P.: Modified AES cipher round and key schedule. Indonesian J. Electr. Eng. Inf. 7(1), 29–36 (2019)

    Google Scholar 

  20. Harmouch, Y., El Kouch, R.: The benefit of using chaos in key schedule algorithm. J. Inf. Secur. Appl. 45, 143–155 (2019)

    Google Scholar 

  21. Rahim, R., Suprianto, S., Multazam, M.T.: GOST enhancement key processing with triple transposition key. J. Phys. Conf. Ser. 1402(6), 066093 (2019)

    Google Scholar 

  22. Sachdeva, S., Kakkar, A.: Implementation of AES-128 using multiple cipher keys. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol. 958, pp. 3–6. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-3804-5_1

  23. Galas, E.M., Gerardo, B.D.: Implementing randomized salt on round key for corrected block tiny encryption algorithm (XXTEA). In: IEEE 11th International Conference on Communication Software and Networks, pp. 795–799. IEEE (2019)

    Google Scholar 

  24. Tezcan, C., Okan, G.O., Şenol, A., Doğan, E., Yücebaş, F., Baykal, N.: Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited. In: Bogdanov, A. (eds.) Lightweight Cryptography for Security and Privacy. LightSec 2016. Lecture Notes in Computer Science, vol. 10098, pp. 18–32. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55714-4_2

  25. Bao, Z., Luo, P., Lin, D.: Bitsliced implementations of the PRINCE, LED and RECTANGLE block ciphers on AVR 8-bit microcontrollers. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) Information and Communications Security. ICICS 2015. Lecture Notes in Computer Science, vol. 9543, pp. 18–36. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29814-6_3

  26. Omrani, T., Rhouma, R., Sliman, L.: Lightweight cryptography for resource-constrained devices: a comparative study and rectangle cryptanalysis. In: Bach Tobji, M., Jallouli, R., Koubaa, Y., Nijholt, A. (eds.) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2018. Lecture Notes in Business Information Processing, vol. 325, pp. 107–118 (2018). Springer, Cham. https://doi.org/10.1007/978-3-319-97749-2_8

  27. Feizi, S., Nemati, A., Ahmadi, A., Makki, V.A.: A high-speed FPGA implementation of a bit-slice ultra-lightweight block cipher, RECTANGLE. In: 5th International Conference on Computer and Knowledge Engineering, pp. 206–211. IEEE (2015)

    Google Scholar 

  28. Rukhin, A., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. In: NIST Special Publication 800–22 Revision 1a (2010)

    Google Scholar 

  29. Zakaria, A.A., Azni, A.H., Ridzuan, F., Zakaria, N.H., Daud, M.: Randomness analysis on RECTANGLE block cipher. Cryptol. Inf. Secur. Conf. 2020, 133–142 (2020)

    Google Scholar 

  30. Chew, L.C.N., Shah, I.N.M., Abdullah, N.A.N., Zawawi, N.H.A., Rani, H.A., Zakaria, A.A.: Randomness analysis on Speck family of lightweight block cipher. Int. J. Cryptol. Res. 5(1), 44–60 (2015)

    Google Scholar 

  31. Simion, E., Burciu, P.: A note on the correlations between NIST cryptographic statistical tests suite. UPB Sci. Bull. Ser. A Appl. Math. Phys. 81(1), 209–218 (2019)

    Google Scholar 

  32. Sarah, M., Sabrina, Z., Boufeldja, A.: Implementation and statistical tests of a block cipher algorithm MISTY1*. Malays. J. Comput. Appl. Math. 2(2), 44–59 (2019)

    Google Scholar 

  33. Abidi, A., Sghaier, A., Bakiri, M., Guyeux, C., Machhout, M.: Statistical analysis and security evaluation of chaotic RC5-CBC symmetric key block cipher algorithm. Int. J. Adv. Comput. Sci. Appl. 10(10), 533–538 (2019)

    Google Scholar 

Download references

Acknowledgments

This work was supported by Universiti Sains Islam Malaysia (USIM) Fundamental Research Grants No: FRGS/1/2019/ICT03/USIM/02/1 and CyberSecurity Malaysia.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Abdul Alif Zakaria or A. H. Azni .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zakaria, A.A., Azni, A.H., Ridzuan, F., Zakaria, N.H., Daud, M. (2021). Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-981-33-6835-4_13

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-33-6834-7

  • Online ISBN: 978-981-33-6835-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics