KTANTAN

KATAN and KTANTAN -- a family of small and efficient hardware-oriented block ciphers. In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers share the 80-bit key size and security level. The first flavor, KATAN, is composed of three block ciphers, with 32, 48, or 64-bit block size. The second flavor, KTANTAN, contains the other three ciphers with the same block sizes, and is more compact in hardware, as the key is burnt into the device (and cannot be changed).par The smallest cipher of the entire family, KTANTAN32, can be implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48, which is the version we recommend for RFID tags uses 588 GE, whereas KATAN64, the largest and most flexible candidate of the family, uses 1054 GE and has a throughput of 25.1 Kbit/sec (at 100 KHz).


References in zbMATH (referenced in 56 articles )

Showing results 1 to 20 of 56.
Sorted by year (citations)

1 2 3 next

  1. Ye, Chen-Dong; Tian, Tian; Zeng, Fan-Yang: The MILP-aided conditional differential attack and its application to Trivium (2021)
  2. Chakraborti, Avik; Iwata, Tetsu; Minematsu, Kazuhiko; Nandi, Mridul: Blockcipher-based authenticated encryption: how small can we go? (2020)
  3. Dey, Sabyasachi; Roy, Tapabrata; Sarkar, Santanu: Some results on Fruit (2019)
  4. Tian, Tian; Zhang, Jia-Min; Qi, Wen-Feng: On the uniqueness of a type of cascade connection representations for NFSRs (2019)
  5. Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (2018)
  6. Hamann, Matthias; Krause, Matthias; Meier, Willi; Zhang, Bin: Design and analysis of small-state grain-like stream ciphers (2018)
  7. Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke: GIFT: a small present. Towards reaching the limit of lightweight encryption (2017)
  8. Dubrova, Elena; Hell, Martin: Espresso: a stream cipher for 5G wireless communication systems (2017)
  9. Hao, Yonglin; Meier, Willi: Truncated differential based known-key attacks on round-reduced SIMON (2017)
  10. Zheng, Yafei; Wu, Wenling: Biclique attack of block cipher \textttSKINNY (2017)
  11. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Exploring energy efficiency of lightweight block ciphers (2016)
  12. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  13. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  14. Canteaut, Anne; Carpov, Sergiu; Fontaine, Caroline; Lepoint, Tancrède; Naya-Plasencia, María; Paillier, Pascal; Sirdey, Renaud: Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression (2016)
  15. Canteaut, Anne; Duval, Sébastien; Leurent, Gaëtan: Construction of lightweight S-boxes using Feistel and MISTY structures (2016)
  16. Chen, Cong; Farmani, Mohammad; Eisenbarth, Thomas: A tale of two shares: why two-share threshold implementation seems worthwhile -- and why it Is not (2016)
  17. Chen, Jiageng; Teh, Je Sen; Su, Chunhua; Samsudin, Azman; Fang, Junbin: Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016)
  18. Derbez, Patrick; Fouque, Pierre-Alain: Automatic search of meet-in-the-middle and impossible differential attacks (2016)
  19. Esgin, Muhammed F.; Kara, Orhun: Practical cryptanalysis of full Sprout with TMD tradeoff attacks (2016)
  20. Lin, Li; Wu, Wenling; Zheng, Yafei: Automatic search for key-bridging technique: applications to LBlock and TWINE (2016)

1 2 3 next