Proceedings of the 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering 2015 2015
DOI: 10.2991/icmmcce-15.2015.136
|View full text |Cite
|
Sign up to set email alerts
|

SVH : A Lightweight Stream Cipher Based on Dual Pseudo-Random Transformation and OFB

Abstract: A new lightweight stream cipher, SVH, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on dual pseudo-random transformation and output feedback. The block of key size is 64 bits and SVH can achieve sufficient security margin against known attacks, such as linear cryptanalysis, differential cryptanalysis, impossible differential cryptanalysis. Hardware implementation of SVH is around 1171GE, which is comparable with the 1458 GE har… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Depending on its structure, there are a variety of stream ciphers, such as Shift Register with Carry Feedback (FCSR), linear Feedback Shift Register (LFSR), addition/rotation/XOR (ARX), Nonlinear Feedback Shift Register (NFSR), and random shuffle [175]. In the literature, several lightweight stream ciphers have been proposed, of which the most notable are Fruit-80 [176], SVH [177], ALE [178], and WG-8 [179].…”
Section: Mitigation Techniques For Protecting Rfid Tagsmentioning
confidence: 99%
“…Depending on its structure, there are a variety of stream ciphers, such as Shift Register with Carry Feedback (FCSR), linear Feedback Shift Register (LFSR), addition/rotation/XOR (ARX), Nonlinear Feedback Shift Register (NFSR), and random shuffle [175]. In the literature, several lightweight stream ciphers have been proposed, of which the most notable are Fruit-80 [176], SVH [177], ALE [178], and WG-8 [179].…”
Section: Mitigation Techniques For Protecting Rfid Tagsmentioning
confidence: 99%
“…However, Wu et al and Khovratovich et al [81,82] claimed that the ALE cipher cannot resist from leaked state forgery attack and LOCAL attack. The scheme proposed by Dai et al [83] uses the 64-bit initialization vector and 64-bit key. This scheme uses 1171 GE operations during the process.…”
Section: Lightweight Stream Ciphermentioning
confidence: 99%