CLEFIA Algortihm
CLEFIA Algortihm
net/publication/371404754
CITATIONS READS
0 15
2 authors:
All content following this page was uploaded by Shekhar Suralkar on 25 January 2024.
atulkarode@gmail.com
Abstract- CLEFIA algorithm is a 128-bit block cipher lines, and the width of each data line is 32 bits. Also,
with its key length being 128, 192 and 256 bits there are key whitening parts at the beginning and the
respectively, which is consistent to AES. CLEFIA is a end of the cipher key. The term whitening is a technique
light weight algorithm concerned with block cipher intended to increase the security of an iterated block
developed by well-known Sony company. CLEFIA name cipher. It consists of steps that combine the data with
is given to this algorithm with reference to the French portions of the key. The number of rounds used in the
word clef which means "key". The block size used is of algorithm is related to the key lengths. As per CLEFIA
128 bits and the key size may be 128-bit, 192 bit or 256 concerned, the 128-bit plain text ,18 rounds were
bits. CLEFIA operates on 128-bit block size with three required, similarly for a 192-bit length of plain text the
different key sizes: 128-bit, 192-bit, 256-bits. number of rounds is 22. And also, for the 256-bit length
In this Paper the performance analysis of Lightweight of the original message 26 rounds have to be
Cryptographic Algorithms based on execution time and performed.[24]
memory use by algorithm is discussed. We executed the cryptographic algorithm CLEFIA in C
language with the Microsoft Visual Studio.
Keywords- Cryptography, CLEFIA, Execution time
Light Weight, Memory. II. LITERATURE REVIEW
Bytes, and 3072 Bytes in which they are calculated III- RESULTS
average values as shown in Figure 1.
A. Memory usage of CLEFIA
From this implementation of execution time, the as the For various memory usage of CLEFIA the hardware
plaintext size increases encryption is increasing rapidly. kit is used is a development kit with the
This happens because of the block cipher consist of two MSP430FR5994 ultra low power microcontroller. It is
feistal function and two diffusion matrixes. While the microcontroller with 16MHz clock frequency has 256
decryption follows a similar procedure with only kB ultra-low power consumption FRAM (Ferroelectric
changes made to the order of round keys and whitening Random-Access Memory) permanent memory.
keys selection. MSP430FR5994 family consist of eZ-FET next
From Figure 1, it can be said that for 512-byte plain text generation on board emulation facility with Energy
with key size 128 bit the execution time is 12.329 msec, Trace Technology. The execution performance of the
similarly for 192 bit the execution time is 16.934 msec encryption and decryption code can be tested and
and for 256 bit the execution time is 18.562msec. analyzed. Code Composer Studio (CCS) [25], which
can be used in devices synthesized by company named
Table 1 Memory usage of CLEFIA for different key size Texas Instruments TI, has been used as an ecological
Block Key Number FRAM RAM development [26].The Operating system used is
length length of rounds Windows 10, v.10.0, x86_64 / win32 Java version:
11.0.11 is use with configuration Intel(R) Core(TM)
128 128 18 3.8KB 1.6KB i3-8145U CPU running at frequency of 2.10GHz, with
RAM4GB of 64 bit processor. On this platform the
128 192 22 3.8KB 1.6KB
extracted parameters related to memory usage are as
128 256 26 3.8KB 1.6KB follows:
20
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23
IV- CONCLUSION
21
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23
matrixes. In the decryption process same two feistal 5386-4008-1/17/$31.00 ©2017 IEEE. pp. 1-7
function and two diffusion matrixes are used in similar 2017.
fashion with only changes made to the order of round [8] Ahmer Khan Jadoon , Licheng Wang , Tong Li ,
keys and whitening keys selection. and Muhammad Azam Zia ,”Review Article
Lightweight Cryptographic Techniques for
REFERENCES Automotive Cybersecurity ”, Hindawi Wireless
Communications and Mobile Computing Volume
2018, Article ID 1640167, pp 1-15, 26 June
[1] Avinash Kak “Some Basic Vocabulary of 2018.
Computer and Network Security and a Brief [9] Shehnaz T. Patel,Nita H. Mistry,”A Survey:
Review of Classical Encryption Techniques Lightweight Cryptography in WSN” IEEE
Lecture Notes on Computer and Network International Conference on Communication
Security, Purdue University 18 April, 2018. Networks (ICCN) 2015, IEEE Proceeding ISSN
[2] Sattar B.Sadkhan, Akbal O. Salman “A Survey on 978-I-S090-00S 1-7I 1S/$3 1.00©2015 IEEE, DOl
Lightweight-Cryptography Status and Future 1O.l 109/ICCN.20IS.3. pp 11-15,2015.
Challenges”, International Conference on [10] Oscar Delgado-Mohatar , Amparo Fúster-
Advances in Sustainable Engineering and Sabater, Jose M. Sierra ,”A light-weight
Applications (ICASEA), Wasit University, Kut, authentication scheme for wireless sensor
Iraq. IEEE Conference proceeding, ISSN 978-1- networks” , Journal of Elsevier B.V, ISSN 1570-
5386-3540-7/18/31.00$©2018 IEEE, 2018. 8705/$. doi:10.1016/j.adhoc.2010.08.020, pp 727-
pp.105-108. June 2018. 735, 8 September2010.
[3] Thomas Eisenbarth Sandeep Kumar Christof [11] Khalid Mahmood, Shehzad Ashraf Chaudhry,
Paar and Axel Poschmann “A Survey of Husnain Naqvi Taeshik Shon , Hafiz Farooq
Lightweight-Cryptography Implementations” Ahmad “A lightweight message authentication
IEEE proceeding on IEEE Design & Test of scheme for Smart Grid communications in power
Computers, Co published by the IEEE CS and the sector” , Journal of Elsevier B.V Computers and
IEEE CASS, ISSN 0740-7475/07/$25.00 G 2007 Electrical Engineering ,0045-7906/©2016
IEEE, pp 1-12,4 October 2017. Elsevier Ltd .pp 1-11,07 March 2016.
[4] Yulong Zou, Jia Zhu, XianbinWang and Lajos [12] Rajani Devi.T, “Importance of Cryptography in
Hanzo, “A Survey on Wireless Security Technical Network Security”, IEEE Proceeding ISSN 978-0-
Challenges, Recent Advances, and Future 7695-4958-3/13 $26.00 © 2013 IEEE, IEEE
Trends” Proceedings of the IEEE Volume 104, Computer Society, DOI
No. 9, Digital Object Identifier: 10.1109/CSNT.2013.102,pp 462-467, 2013.
10.1109/JPROC.2016.2558521, pp 1727-1765 [13] Masanobu Katagi and Shiho Moriai,
September 2016. “Lightweight Cryptography for the Internet of
[5] Gaurav Bansod, Nishchal Raval and Narayan Things”, White paper by Sony Corporation, pp 1-
Pisharoty “Implementation of a New Lightweight 4.
Encryption Design for Embedded Security” IEEE [14] Lara-Ni, Carlos Andres, Morales-Sandoval,
Transactions on Information Forensics And Miguel and Dıaz-Perez “An evaluation of AES
Security, Vol. 10, No. 1, ISSN 1556-6013 © 2014 and PRESENT ciphers for lightweight
IEEE, DOI10.1109/TIFS.2014.2365734 pp,142- cryptography on smart phones”, IEEE
151 January 2015. Proceeding ISSN 978-1-5090-0079-1/16/$31.00
[6] Pradeep Semwal, Mahesh Kumar Sharma ©2016 IEEE, pp 87-93, 2016.
“Comparative Study of Different Cryptographic [15] Charalampos Manifavas , George Hatzivasilis ,
Algorithms for Data Security in Cloud Konstantinos Fysarakis , and Konstantinos
Computing” ISSN 978-15090-6403-8/17/$31.00 Rantos “Lightweight Cryptography for Embedded
© 2017 IEEE pp.1-7, 2017. Systems - A Comparative Analysis” White paper
[7] Sarika Y. Bonde ,Dr. U. S. Bhadade, “Analysis of by Dept. of Applied Informatics & Multimedia,
Encryption Algorithms (RSA, SRNN and 2 key Technological Educational Institute of Crete,
pair) for Information Security” ISSN 978-1- Heraklion, Crete, Greece, pp 1-10.
22
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23
[16] Axel York Poschmann Bochum, “LIGHTWEIGHT [25] Bora Aslan Fusun Yavuzer Aslan and M. Tolga
CRYPTOGRAPHY -Cryptographic Engineering Sakallı “Energy Consumption Analysis of
for a Pervasive World “ Thesis ,Faculty of Lightweight Crypto graphic Algorithms That Can
Electrical Engineering and Information Be Used in the Security of Internet of Things
Technology RuhrUniversity Bochum, Germany. Applications” Research Article Hindawi Security
pp 1-5, February 2009. and Communication Networks, Volume 2020,
[17] Kerry A. McKay ,LarryBassham, Meltem Sonmez Article ID 8837671, 15 pages
Turan , Nicky Mouha “Report on Lightweight [26] Levent Ertaul, Sachin Kattepura Rajegowda
Cryptography” NISTIR 8114,National Institute of California State University East Bay, Hayward,
Standards and Technology U.S. Department of CA, USA.” Performance Analysis of CLEFIA,
Commerce, Internal Report 8114 pp-1-14 March PICCOLO, TWINE Lightweight Block Ciphers in
2017. IoT Environment”. International Conference on
[18] Tetsu Iwata “The 128-bit Block cipher CLEFIA Security and Management. ISBN: 1-60132-467-7.
Design Rationale” Report on development of CSREA PRESS. Pp 25-31
CLEFIA by Sony Corporation, Konan, Minato-ku, [27] Vishal A. Thakor, Mohammad Abdur Razzaque
Tokyo 108-0075 Japan June 1, 2007. (Member, IEEE), Muhammad R. A. Khandaker
[19] Madhumita Panda “Performance Analysis of (Senior Member, IEEE) “Lightweight
Encryption Algorithms for Security” International Cryptography Algorithms for Resource-
conference on Signal Processing, Constrained IoT Devices: A Review, Comparison
Communication, Power and Embedded System and Research Opportunities”
(SCOPES)-2016 IEEE Proceeding ISSN 978-1- [28] IEEE Access, date of publication January 19,
5090-4620-1/16/$31.00 ©2016 IEEE, pp 278- 2021, date of current version February 22,
284, 2016. 2021.Volume 9 2021, pp 28177-28193.
[20] Chaitra B, Kiran Kumar V. G, Shatharama Rai
“A Survey on Various Lightweight Cryptographic
Algorithms on FPGA” IOSR Journal of
Electronics and Communication Engineering
(IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-
8735.Volume 12, Issue 1, Ver. II (Jan.-Feb. 2017),
PP 54-59
[21] Jaber Hossein Zadeh,Abbas Ghaemi Bafghi
“Evaluation of Lightweight Block Ciphers in
Hardware Implementation: A Comprehensive
Survey”2016 1st International Conference on
New Research Achievements in Electrical and
Computer Engineering.
[22] Levent Ertaul, Sachin Kattepura Rajegowda
“Performance Analysis of CLEFIA, PICCOLO,
TWINE Lightweight Block Ciphers in IoT
Environment” International Conference on
Security and Management SAM'17, ISBN: 1-
60132-467-7, CSREA Press ©, Pp 25-31.
[23] Taizo Shirai, Kyoji Shibutani, Toru Akishita,
Shiho Moriai, and Tetsu Iwata “The 128-bit Block
cipher CLEFIA”(Extended Abstract), Sony
Corporation, Konan, Minato-ku, Tokyo 108-0075
Japan June 1, 2007.
[24] Tetsu Iwata of Nagoya University, The 128-bit
Block cipher CLEFIA Algorithm Speciation,
Revision 1.0June 1, 2007.
23