KATAN and KTANTAN -- a family of small and efficient hardware-oriented block ciphers. In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers share the 80-bit key size and security level. The first flavor, KATAN, is composed of three block ciphers, with 32, 48, or 64-bit block size. The second flavor, KTANTAN, contains the other three ciphers with the same block sizes, and is more compact in hardware, as the key is burnt into the device (and cannot be changed).par The smallest cipher of the entire family, KTANTAN32, can be implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48, which is the version we recommend for RFID tags uses 588 GE, whereas KATAN64, the largest and most flexible candidate of the family, uses 1054 GE and has a throughput of 25.1 Kbit/sec (at 100 KHz).

References in zbMATH (referenced in 60 articles )

Showing results 21 to 40 of 60.
Sorted by year (citations)
  1. Chen, Jiageng; Teh, Je Sen; Su, Chunhua; Samsudin, Azman; Fang, Junbin: Improved (related-key) attacks on round-reduced KATAN-32/48/64 based on the extended boomerang framework (2016)
  2. Derbez, Patrick; Fouque, Pierre-Alain: Automatic search of meet-in-the-middle and impossible differential attacks (2016)
  3. Esgin, Muhammed F.; Kara, Orhun: Practical cryptanalysis of full Sprout with TMD tradeoff attacks (2016)
  4. Lin, Li; Wu, Wenling; Zheng, Yafei: Automatic search for key-bridging technique: applications to LBlock and TWINE (2016)
  5. Luykx, Atul; Preneel, Bart; Tischhauser, Elmar; Yasuda, Kan: A MAC mode for lightweight block ciphers (2016)
  6. Rasoolzadeh, Shahram; Raddum, Håvard: Improved multi-dimensional meet-in-the-middle cryptanalysis of KATAN (2016)
  7. Tolba, Mohamed; Youssef, Amr M.: Generalized MitM attacks on full TWINE (2016)
  8. Blondeau, Céline; Peyrin, Thomas; Wang, Lei: Known-key distinguisher on full (\mathttPRESENT) (2015)
  9. Dinur, Itai; Dunkelman, Orr; Keller, Nathan; Shamir, Adi: New attacks on Feistel structures with improved memory complexities (2015)
  10. Guo, Jian; Su, Chunhua; Yap, Wun-She: An improved preimage attack against \textttHAVAL-3 (2015)
  11. Karakoç, F.; Demirci, H.; Harmancı, A. E.: AKF: a key alternating Feistel scheme for lightweight cipher designs (2015)
  12. Lallemand, Virginie; Naya-Plasencia, María: Cryptanalysis of full sprout (2015)
  13. Wu, Wenling; Zhang, Lei; Yu, Xiaoli: The DBlock family of block ciphers (2015)
  14. Bulygin, Stanislav; Walter, Michael; Buchmann, Johannes: Full analysis of \textscPRINTcipherwith respect to invariant subspace attack: efficient key recovery and countermeasures (2014)
  15. Doröz, Yarkın; Shahverdi, Aria; Eisenbarth, Thomas; Sunar, Berk: Toward practical homomorphic evaluation of block ciphers using prince (2014) ioport
  16. Huang, Jialin; Lai, Xuejia: What is the effective key length for a block cipher: an attack on every practical block cipher (2014)
  17. Zhu, Bo; Gong, Guang: Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 (2014)
  18. Albrecht, Martin R.; Leander, Gregor: An all-in-one approach to differential cryptanalysis for small block ciphers (2013)
  19. Aumasson, Jean-Philippe; Henzen, Luca; Meier, Willi; Naya-Plasencia, María: Quark: a lightweight hash (2013)
  20. Das, Ashok Kumar: A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications (2013) ioport