Abstract
Key schedule algorithm is one of the core elements that significantly affect the security of an encryption algorithm. While its importance is undeniable, the key schedule algorithm has not been given comprehensive attention compared to the encryption algorithm. RECTANGLE block cipher is very efficient in terms of encryption speed performance among the existing lightweight algorithms. However, its non-robust round keys generation seems to be the weakest point of the algorithm. A robust key schedule algorithm should produce round keys with random characteristics, independent, and not correlated to one another as defined in the randomization and confusion properties. Therefore, the objective of this paper is to improve the RECTANGLE key schedule algorithm to increase its randomization and confusion properties against high correlation keys as well as the speed and throughput performances. Three experiments were conducted based on the randomness, key sensitivity, and performance tests. The results show that our modified designs have produced lower correlation keys by 0.16% to 0.45% improvement, more random ciphertext with an increase of 13.34% to 20.00% passing rate, and better performance that recorded 1.30% to 7.82% faster and increased by 1.33% to 8.50% throughput than the original RECTANGLE.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baysal, A., Şahin, S.: RoadRunneR: a small and fast bitslice block cipher for low cost 8-bit processors. In: Güneysu, T., Leander, G., Moradi, A. (eds.) Lightweight Cryptography for Security and Privacy. LightSec 2015. Lecture Notes in Computer Science, vol. 9542, pp. 58–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29078-2_4
Zhang, W., Bao, Z., Lin, D., Rijmen, V., Yang, B., Verbauwhede, I.: RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci. China Inf. Sci. 58(12), 1–5 (2015). https://doi.org/10.1007/s11432-015-5459-7
Li, L., Liu, B., Wang, H.: QTL: a new ultra-lightweight block cipher. Microprocess. Microsyst. 45, 45–55 (2016)
Beierle, C. et al.: The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS. In: Robshaw, M., Katz, J. (eds.) Advances in Cryptology – CRYPTO 2016. CRYPTO 2016. Lecture Notes in Computer Science, vol. 9815, pp. 123–153. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53008-5_5
Bansod, G., Pisharoty, N., Patil, A.: BORON: an ultra-lightweight and low power encryption design for pervasive computing. Front. Inf. Technol. Electron. Eng. 18(3), 317–331 (2017). https://doi.org/10.1631/FITEE.1500415
Usman, M., Ahmed, I., Imran, M., Khan, S., Ali, U.: SIT: a lightweight encryption algorithm for secure Internet of Things. Int. J. Adv. Comput. Sci. Appl. 8(1), 402–411 (2017)
Bansod, G., Pisharoty, N., Patil, A.: MANTRA: an ultra lightweight cipher design for ubiquitous computing. Int. J. Ad Hoc Ubiquitous Comput. 28(1), 13–26 (2018)
Li, L., Liu, B., Zhou, Y., Zou, Y.: SFN: a new lightweight block cipher. Microprocess. Microsyst. 60, 138–150 (2018)
Beierle, C., Leander, G., Moradi, A., Rasoolzadeh, S.: CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks. IACR Trans. Symmetric Cryptol. 1, 5–45 (2019)
Liu, B.T., Li, L., Wu, R.X., Xie, M.M., Li, Q.P.: Loong: a family of involutional lightweight block cipher based on SPN structure. IEEE Access 7, 136023–136035 (2019)
Biswas, A., Majumdar, A., Nath, S., Dutta, A., Baishnab, K. L.: LRBC: a lightweight block cipher design for resource constrained IoT devices. J. Ambient Intell. Hum. Comput., 1–15 (2020). https://doi.org/10.1007/s12652-020-01694-9
Yeoh, W.Z., Teh, J.S., Sazali, M.I.S.B.M.: µ2: a Lightweight block cipher. In: Alfred, R., Lim, Y., Haviluddin, H., On, C. (eds.) Computational Science and Technology. Lecture Notes in Electrical Engineering, vol. 603, pp. 281–290. Springer, Singapore (2020). https://doi.org/10.1007/978-981-15-0058-9_27
Senol, A.: Improved differential attacks on rectangle. Master’s thesis, Middle East Technical University (2017)
Yan, H., Luo, Y., Chen, M., Lai, X.: New observation on the key schedule of RECTANGLE. Sci. China Inf. Sci. 62(3), 1–3 (2019). https://doi.org/10.1007/s11432-018-9527-8
Afzal, S., Waqas, U., Mir, M. A., Yousaf, M.: Statistical analysis of key schedule algorithms of different block ciphers. Sci. Int. 27(3), 1835–1839 (2015)
Derbez, P., Fouque, P.A.., Jean, J., Lambin, B.: Variants of the AES Key schedule for better truncated differential bounds. In: Cid, C., Jacobson, Jr., M. (eds.) Selected Areas in Cryptography – SAC 2018. SAC 2018. Lecture Notes in Computer Science, vol. 11349, pp. 27–49. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-10970-7_2
Hussien, H.M., Muda, Z., Yasin, S.M.: New key expansion function of Rijndael 128-bit resistance to the related-key attacks. J. Inf. Commun. Technol. 19(3), 409–434 (2018)
Guo, C., Wang, L.: Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security. In: Peyrin, T., Galbraith, S. (eds) Advances in Cryptology – ASIACRYPT 2018. ASIACRYPT 2018. Lecture Notes in Computer Science, vol. 11272, pp. 213–243. Springer, Cham. https://doi.org/10.1007/978-3-030-03326-2_8
De Los Reyes, E.M., Sison, A.M., Medina, R.P.: Modified AES cipher round and key schedule. Indonesian J. Electr. Eng. Inf. 7(1), 29–36 (2019)
Harmouch, Y., El Kouch, R.: The benefit of using chaos in key schedule algorithm. J. Inf. Secur. Appl. 45, 143–155 (2019)
Rahim, R., Suprianto, S., Multazam, M.T.: GOST enhancement key processing with triple transposition key. J. Phys. Conf. Ser. 1402(6), 066093 (2019)
Sachdeva, S., Kakkar, A.: Implementation of AES-128 using multiple cipher keys. In: Singh, P., Paprzycki, M., Bhargava, B., Chhabra, J., Kaushal, N., Kumar, Y. (eds) Futuristic Trends in Network and Communication Technologies. FTNCT 2018. Communications in Computer and Information Science, vol. 958, pp. 3–6. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-3804-5_1
Galas, E.M., Gerardo, B.D.: Implementing randomized salt on round key for corrected block tiny encryption algorithm (XXTEA). In: IEEE 11th International Conference on Communication Software and Networks, pp. 795–799. IEEE (2019)
Tezcan, C., Okan, G.O., Şenol, A., Doğan, E., Yücebaş, F., Baykal, N.: Differential attacks on lightweight block ciphers PRESENT, PRIDE, and RECTANGLE revisited. In: Bogdanov, A. (eds.) Lightweight Cryptography for Security and Privacy. LightSec 2016. Lecture Notes in Computer Science, vol. 10098, pp. 18–32. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-55714-4_2
Bao, Z., Luo, P., Lin, D.: Bitsliced implementations of the PRINCE, LED and RECTANGLE block ciphers on AVR 8-bit microcontrollers. In: Qing, S., Okamoto, E., Kim, K., Liu, D. (eds.) Information and Communications Security. ICICS 2015. Lecture Notes in Computer Science, vol. 9543, pp. 18–36. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-29814-6_3
Omrani, T., Rhouma, R., Sliman, L.: Lightweight cryptography for resource-constrained devices: a comparative study and rectangle cryptanalysis. In: Bach Tobji, M., Jallouli, R., Koubaa, Y., Nijholt, A. (eds.) Digital Economy. Emerging Technologies and Business Innovation. ICDEc 2018. Lecture Notes in Business Information Processing, vol. 325, pp. 107–118 (2018). Springer, Cham. https://doi.org/10.1007/978-3-319-97749-2_8
Feizi, S., Nemati, A., Ahmadi, A., Makki, V.A.: A high-speed FPGA implementation of a bit-slice ultra-lightweight block cipher, RECTANGLE. In: 5th International Conference on Computer and Knowledge Engineering, pp. 206–211. IEEE (2015)
Rukhin, A., et al.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. In: NIST Special Publication 800–22 Revision 1a (2010)
Zakaria, A.A., Azni, A.H., Ridzuan, F., Zakaria, N.H., Daud, M.: Randomness analysis on RECTANGLE block cipher. Cryptol. Inf. Secur. Conf. 2020, 133–142 (2020)
Chew, L.C.N., Shah, I.N.M., Abdullah, N.A.N., Zawawi, N.H.A., Rani, H.A., Zakaria, A.A.: Randomness analysis on Speck family of lightweight block cipher. Int. J. Cryptol. Res. 5(1), 44–60 (2015)
Simion, E., Burciu, P.: A note on the correlations between NIST cryptographic statistical tests suite. UPB Sci. Bull. Ser. A Appl. Math. Phys. 81(1), 209–218 (2019)
Sarah, M., Sabrina, Z., Boufeldja, A.: Implementation and statistical tests of a block cipher algorithm MISTY1*. Malays. J. Comput. Appl. Math. 2(2), 44–59 (2019)
Abidi, A., Sghaier, A., Bakiri, M., Guyeux, C., Machhout, M.: Statistical analysis and security evaluation of chaotic RC5-CBC symmetric key block cipher algorithm. Int. J. Adv. Comput. Sci. Appl. 10(10), 533–538 (2019)
Acknowledgments
This work was supported by Universiti Sains Islam Malaysia (USIM) Fundamental Research Grants No: FRGS/1/2019/ICT03/USIM/02/1 and CyberSecurity Malaysia.
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Zakaria, A.A., Azni, A.H., Ridzuan, F., Zakaria, N.H., Daud, M. (2021). Modifications of Key Schedule Algorithm on RECTANGLE Block Cipher. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_13
Download citation
DOI: https://doi.org/10.1007/978-981-33-6835-4_13
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6834-7
Online ISBN: 978-981-33-6835-4
eBook Packages: Computer ScienceComputer Science (R0)