Abstract
In this paper we propose a new block cipher, DESL (DES Lightweight), which is based on the classical DES (Data Encryption Standard) design, but unlike DES it uses a single S-box repeated eight times. On this account we adapt well-known DES S-box design criteria, such that they can be applied to the special case of a single S-box. Furthermore, we show that DESL is resistant against certain types of the most common attacks, i.e., linear and differential cryptanalyses, and the Davies-Murphy attack. Our hardware implementation results of DESL are very promising (1848 GE), therefore DESL is well suited for ultra-constrained devices such as RFID tags.
Chapter PDF
Similar content being viewed by others
References
Satoh, K.T.A., Morioka, S., Munetoh, S.: A Compact Rijndael Hardware Architecture with S-Box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239–254. Springer, Heidelberg (2001)
Biham, Biryukov: How to Strengthen DES Using Existing Hardware. In: Safavi-Naini, R., Pieprzyk, J.P. (eds.) ASIACRYPT 1994. LNCS, vol. 917, Springer, Heidelberg (1995), available for download at citeseer.ist.psu.edu/biham94how.html
Biham, E., Biryukov, A.: An Improvement of Davies’ Attack on DES. Journal of Cryptology: the journal of the International Association for Cryptologic Research 10(3), 195–205 (1997), available for download at citeseer.ist.psu.edu/467934.html
Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)
Biham, E., Shamir, A.: Differential Cryptanalysis of the Full 16-Round DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 487–496. Springer, Heidelberg (1993), available for download at citeseer.ist.psu.edu/biham93differential.html
Coppersmith, D.: The Data Encryption Standard (DES) and its Strength Against Attacks. Technical report rc 186131994, IBM Thomas J. Watson Research Center (December 1994)
Davies, D., Murphy, S.: Pairs and Triplets of DES S-Boxes. Journal of Cryptology 8(1), 1–25 (1995)
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer Verlag, Heidelberg, Berlin (2002)
Feldhofer, M., Dominikus, S., Wolkerstorfer, J.: Strong Authentication for RFID Systems. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 357–370. Springer, Heidelberg (2004)
Finkenzeller, K.: RFID-Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley and Sons, Chichester (2003)
Feldhofer, M., Wolkerstorfer, J., Rijmen, V.: AES Implementation on a Grain of Sand. Information Security, IEE Proceedings 152(1), 13–20 (2005)
Good, T., Benaissa, M.: Hardware Results for selected Stream Cipher Candidates. In: State of the Art of Stream Ciphers 2007 (SASC 2007), Workshop Record (February 2007)
Hong, D., Sung, J., Hong, S., Lim, J., Lee, S., Koo, B.-S., Lee, C., Chang, D., Lee, J., Jeong, K., Kim, H., Kim, J., Chee, S.: HIGHT: A New Block Cipher Suitable for Low-Resource Device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006)
Kim, K., Lee, S., Park, S., Lee, D.: DES Can Be Immune to Linear Cryptanalysis. In: Proceedings of the Workshop on Selected Areas in Cryptography SAC 1994, pp. 70–81 (May 1994), available for download at citeseer.csail.mit.edu/kim94des.html
Kim, K., Lee, S., Park, S., Lee, D.: Securing DES S-boxes Against Three Robust Cryptanalysis. In: Proceedings of the Workshop on Selected Areas in Cryptography SAC’95, pp. 145–157 (1995), available for download at citeseer.ist.psu.edu/kim95securing.html
Knudsen, L.R.: Iterative Characteristics of DES and s 2-DES. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 497–511. Springer, Heidelberg (1993)
Kim, K., Park, S., Lee, S.: Reconstruction of s 2-DES S-Boxes and their Immunity to Differential Cryptanalysis. In: Proceedings of 1993 Korea-Japan Joint Workshop on Information Security and Cryptology (JW-ISC 1993) (October 1993), available for download at citeseer.csail.mit.edu/kim93reconstruction.html
Kumar, S., Paar, C., Pelzl, J., Pfeiffer, G., Schimmler, M.: Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, Springer, Heidelberg (2006)
Matsui, M.: Linear Cryptanalysis of DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 286–397. Springer, Heidelberg (1994)
Poschmann, A., Leander, G., Schramm, K., Paar, C.: New Ligh-Weight Crypto Algorithms for RFID. In: Proceedings of The IEEE International Symposium on Circuits and Systems 2007 – ISCAS 2007, IEEE Computer Society Press, Los Alamitos, 2007 (to appear)
Rankl, W., Effing, W.: Smart Card Handbook. Carl Hanser Verlag, München, Germany, 2nd edn. (2002)
Verbauwhede, I., Hoornaert, F., Vandewalle, J., De Man, H.: Security and Performance Optimization of a New DES Data Encryption Chip. IEEE Journal of Solid-State Circuits 23(3), 647–656 (1988)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Leander, G., Paar, C., Poschmann, A., Schramm, K. (2007). New Lightweight DES Variants. In: Biryukov, A. (eds) Fast Software Encryption. FSE 2007. Lecture Notes in Computer Science, vol 4593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74619-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-540-74619-5_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74617-1
Online ISBN: 978-3-540-74619-5
eBook Packages: Computer ScienceComputer Science (R0)