Myoungsu Shin;Hanbeom Shin;Insung Kim;Sunyeop Kim;Dongjae Lee;Deukjo Hong;Jaechul Sung;Seokhie Hong
{"title":"SAECHAM: Secure and Efficient Lightweight Block Cipher CHAM Variant","authors":"Myoungsu Shin;Hanbeom Shin;Insung Kim;Sunyeop Kim;Dongjae Lee;Deukjo Hong;Jaechul Sung;Seokhie Hong","doi":"10.1109/JIOT.2025.3569746","DOIUrl":null,"url":null,"abstract":"The addition, rotation, XOR (ARX) structure, which comprises three fundamental operations—Addition, Rotation, and XOR—makes it well-suited for lightweight cryptography. To design a secure and efficient ARX cipher, it is necessary to find the optimal structure by properly combining the order, number of operations, and rotation amounts. <inline-formula> <tex-math>$\\textsf {CHAM64}$ </tex-math></inline-formula> is an ARX block cipher with a 64-bit block size, which is proposed as an attempt to enhance the lightweight characteristics of <inline-formula> <tex-math>$\\textsf {LEA}$ </tex-math></inline-formula>. In this article, we present secure and efficient <inline-formula> <tex-math>$\\textsf {CHAM}$ </tex-math></inline-formula> (<inline-formula> <tex-math>$\\textsf {SAECHAM}$ </tex-math></inline-formula>), a variant of <inline-formula> <tex-math>$\\textsf {CHAM64}$ </tex-math></inline-formula> with a rearranged order of operations and adjusted rotation amounts. By changing the order of the operations in <inline-formula> <tex-math>$\\textsf {CHAM64}$ </tex-math></inline-formula>, six different <inline-formula> <tex-math>$\\textsf {CHAM}$ </tex-math></inline-formula>-like structures can be created. We propose the properties that can be eliminated in the implementation process depending on the rotation amount in each structure. To improve suitability for constrained environments, such as 8-bit and 16-bit microcontrollers, we reduce the search space for rotation amounts and analyze the number of instructions. Using an SMT solver-based automatic search method, we analyze the security of <inline-formula> <tex-math>$62 \\; \\textsf {CHAM64}$ </tex-math></inline-formula> variants through differential and linear analysis. Among them, we find four variants with equal or better resistance to differential and linear cryptanalysis compared to <inline-formula> <tex-math>$\\textsf {CHAM64}$ </tex-math></inline-formula>. As a result, we propose the variant with the fewest instructions among them as <inline-formula> <tex-math>$\\textsf {SAECHAM}$ </tex-math></inline-formula>. Through software implementations on 8-bit AVR, 16-bit MSP430, 32-bit ARM Cortex-M3 and Cortex-M4 platforms, we demonstrate that <inline-formula> <tex-math>$\\textsf {SAECHAM}$ </tex-math></inline-formula> is efficient in terms of encryption speed and also performs efficiently when implemented using SIMD operations in high-performance CPUs.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 15","pages":"29989-30002"},"PeriodicalIF":8.9000,"publicationDate":"2025-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11003085/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The addition, rotation, XOR (ARX) structure, which comprises three fundamental operations—Addition, Rotation, and XOR—makes it well-suited for lightweight cryptography. To design a secure and efficient ARX cipher, it is necessary to find the optimal structure by properly combining the order, number of operations, and rotation amounts. $\textsf {CHAM64}$ is an ARX block cipher with a 64-bit block size, which is proposed as an attempt to enhance the lightweight characteristics of $\textsf {LEA}$ . In this article, we present secure and efficient $\textsf {CHAM}$ ($\textsf {SAECHAM}$ ), a variant of $\textsf {CHAM64}$ with a rearranged order of operations and adjusted rotation amounts. By changing the order of the operations in $\textsf {CHAM64}$ , six different $\textsf {CHAM}$ -like structures can be created. We propose the properties that can be eliminated in the implementation process depending on the rotation amount in each structure. To improve suitability for constrained environments, such as 8-bit and 16-bit microcontrollers, we reduce the search space for rotation amounts and analyze the number of instructions. Using an SMT solver-based automatic search method, we analyze the security of $62 \; \textsf {CHAM64}$ variants through differential and linear analysis. Among them, we find four variants with equal or better resistance to differential and linear cryptanalysis compared to $\textsf {CHAM64}$ . As a result, we propose the variant with the fewest instructions among them as $\textsf {SAECHAM}$ . Through software implementations on 8-bit AVR, 16-bit MSP430, 32-bit ARM Cortex-M3 and Cortex-M4 platforms, we demonstrate that $\textsf {SAECHAM}$ is efficient in terms of encryption speed and also performs efficiently when implemented using SIMD operations in high-performance CPUs.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.