Visible to the public Performance Analysis on Enhanced Round Function of SIMECK Block Cipher

TitlePerformance Analysis on Enhanced Round Function of SIMECK Block Cipher
Publication TypeConference Paper
Year of Publication2020
AuthorsPhilipcris C Encarnacion, Bobby D Gerardo, Alexander A Hernandez
Conference Name2020 12th International Conference on Communication Software and Networks (ICCSN)
Date PublishedJune 2020
PublisherIEEE
ISBN Number978-1-7281-9815-6
Keywordsalgorithm design, avalanche effect, brute force attacks, brute-force attack, cryptography, encryption time, enhanced ARX structure, enhanced round function, human factors, Internet of Things, Internet of Things technologies, IoT, LBC, lightweight block ciphers, Performance analysis, policy-based governance, resource-constrained devices, security level, security measurements, security requirements, SIMECK family block cipher, SIMON, software performance evaluation
Abstract

There are various Lightweight Block Ciphers (LBC) nowadays that exist to meet the demand on security requirements of the current trend in computing world, the application in the resource-constrained devices, and the Internet of Things (IoT) technologies. One way to evaluate these LBCs is to conduct a performance analysis. Performance evaluation parameters seek appropriate value such as encryption time, security level, scalability, and flexibility. Like SIMECK block cipher whose algorithm design was anchored with the SIMON and SPECK block ciphers were efficient in security and performance, there is a need to revisit its design. This paper aims to present a comparative study on the performance analysis of the enhanced round function of the SIMECK Family block cipher. The enhanced ARX structure of the round function on the three variants shows an efficient performance over the original algorithm in different simulations using the following methods of measurement; avalanche effect, runtime performance, and brute-force attack. Its recommended that the enhanced round function of the SIMECK family be evaluated by different security measurements and attacks.

URLhttps://ieeexplore.ieee.org/document/9139059
DOI10.1109/ICCSN49894.2020.9139059
Citation Keyencarnacion_performance_2020