0% found this document useful (0 votes)
12 views6 pages

CLEFIA Algortihm

CLEFIA ALGORITHM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views6 pages

CLEFIA Algortihm

CLEFIA ALGORITHM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/371404754

Review on Performance Analysis of Lightweight Cryptographic Algorithm-


CLEFIA

Article in International Journal of Innovations in Engineering and Science · April 2023


DOI: 10.46335/IJIES.2023.8.3.4

CITATIONS READS

0 15

2 authors:

Atul Hiralal Karode Shekhar Suralkar


Shram Sadhana Bombay Trust's College of Engineering and Technology Shram Sadhana Bombay Trust's College of Engineering and Technology
6 PUBLICATIONS 56 CITATIONS 11 PUBLICATIONS 48 CITATIONS

SEE PROFILE SEE PROFILE

All content following this page was uploaded by Shekhar Suralkar on 25 January 2024.

The user has requested enhancement of the downloaded file.


https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23

International Journal of Innovations in Engineering and Science, www.ijies.net

Review on Performance Analysis of Lightweight


Cryptographic Algorithm-CLEFIA
Atul H. Karode1, Dr. Shekhar R Suralkar2
1
Ph D Research Scholar,
1
Department of E&TC, SSBT’s College of Engineering and Technology, Bambhori Jalgaon
Jalgaon 425001 (India)
2
Professor
2
Department of Computer Engg., SSBT’s College of Engineering and Technology, Bambhori Jalgaon
Jalgaon 425001 (India)

atulkarode@gmail.com

Received on:29 March,2023 Revised on: 09 April,2023 Published on:11 April,2023

Abstract- CLEFIA algorithm is a 128-bit block cipher lines, and the width of each data line is 32 bits. Also,
with its key length being 128, 192 and 256 bits there are key whitening parts at the beginning and the
respectively, which is consistent to AES. CLEFIA is a end of the cipher key. The term whitening is a technique
light weight algorithm concerned with block cipher intended to increase the security of an iterated block
developed by well-known Sony company. CLEFIA name cipher. It consists of steps that combine the data with
is given to this algorithm with reference to the French portions of the key. The number of rounds used in the
word clef which means "key". The block size used is of algorithm is related to the key lengths. As per CLEFIA
128 bits and the key size may be 128-bit, 192 bit or 256 concerned, the 128-bit plain text ,18 rounds were
bits. CLEFIA operates on 128-bit block size with three required, similarly for a 192-bit length of plain text the
different key sizes: 128-bit, 192-bit, 256-bits. number of rounds is 22. And also, for the 256-bit length
In this Paper the performance analysis of Lightweight of the original message 26 rounds have to be
Cryptographic Algorithms based on execution time and performed.[24]
memory use by algorithm is discussed. We executed the cryptographic algorithm CLEFIA in C
language with the Microsoft Visual Studio.
Keywords- Cryptography, CLEFIA, Execution time
Light Weight, Memory. II. LITERATURE REVIEW

I. INTRODUCTION CLEFIA PERFORMANCE

CLEFIA Execution Time- As the execution time or


The CLEFIA nurture 128-bit block size with three Speed of the operation is one of the important key
parameters used to evaluate the performance of the block
different key sizes: 128-bit, 192-bit, 256-bits. CLEFIA ciphers [26]. In paper titled “ Performance Analysis of
consists of two mains segments: a data processing and a CLEFIA, PICCOLO, TWINE Lightweight Block
key scheduling segment. CLEFIA hires a generalized Ciphers in IoT Environment”[26] the author executed
Feistel (Gf) structure which is a symmetric structure the CLEFIA algorithm for 128 bit, 192 bit, and 256 bit
used in the construction of block ciphers, with four data Keys for plaintexts of size 512 Bytes, 1024 Bytes, 2048
19
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23

International Journal of Innovations in Engineering and Science, www.ijies.net

Bytes, and 3072 Bytes in which they are calculated III- RESULTS
average values as shown in Figure 1.
A. Memory usage of CLEFIA
From this implementation of execution time, the as the For various memory usage of CLEFIA the hardware
plaintext size increases encryption is increasing rapidly. kit is used is a development kit with the
This happens because of the block cipher consist of two MSP430FR5994 ultra low power microcontroller. It is
feistal function and two diffusion matrixes. While the microcontroller with 16MHz clock frequency has 256
decryption follows a similar procedure with only kB ultra-low power consumption FRAM (Ferroelectric
changes made to the order of round keys and whitening Random-Access Memory) permanent memory.
keys selection. MSP430FR5994 family consist of eZ-FET next
From Figure 1, it can be said that for 512-byte plain text generation on board emulation facility with Energy
with key size 128 bit the execution time is 12.329 msec, Trace Technology. The execution performance of the
similarly for 192 bit the execution time is 16.934 msec encryption and decryption code can be tested and
and for 256 bit the execution time is 18.562msec. analyzed. Code Composer Studio (CCS) [25], which
can be used in devices synthesized by company named
Table 1 Memory usage of CLEFIA for different key size Texas Instruments TI, has been used as an ecological
Block Key Number FRAM RAM development [26].The Operating system used is
length length of rounds Windows 10, v.10.0, x86_64 / win32 Java version:
11.0.11 is use with configuration Intel(R) Core(TM)
128 128 18 3.8KB 1.6KB i3-8145U CPU running at frequency of 2.10GHz, with
RAM4GB of 64 bit processor. On this platform the
128 192 22 3.8KB 1.6KB
extracted parameters related to memory usage are as
128 256 26 3.8KB 1.6KB follows:

For 1024-byte plain text with key size 128bit the


execution time is 24.782 msec, similarly for 192 bit the
execution time is 33.521msec and for 256 bit the
execution time is 36.89 msec

Photograph 1 showing Memory usage of CLEFIA


B. Calculation of Execution Time
Figure 1 CLEFIA encryption execution time.[26] Now in this section we are going to focus on execution
time of CLEFIA with Microsoft Visual studio with
Also, for 2048-byte plain text with key size 128 bit the following platform
execution time is 49.105 msec, similarly for 192 bit System configuration
the execution time is 67.76 msec and for 256 bit the System model- Laptop
execution time is 73.727msec. System type- x64 based PC
Finally for 3072 byte plain text with key size 128bit RAM - 4GB
the execution time is 73.86 msec , similarly for 192 bit OS- MS Window 10 pro
the execution time is 100.89 msec and for 256 bit the The Version used 10.0.18363 with build 18363
execution time is 110.635msec.

20
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23

International Journal of Innovations in Engineering and Science, www.ijies.net

Processor- Intel (R) Core™ i3-8145 CPU with frequency


2.10 GHz
As Shown in Figure 1, the execution time for 512-byte
plain text with key size 128 bit the execution time is
12.329 msec, similarly for 192 bit the execution time is
16.934 msec and for 256 bit the execution time is 18.562
msec. [26].
The CPU clock speed is 84 MHz and SRAM are of 96
KB [26].
Now process time is calculate as follows. The time taken
by a process, so here we are using clock function
time.h. Hence, we called the clock function at the
starting and end of the code for which we have to Figure 3 Exection Time for CLEFIA 192 bit key size
measure time, subtract the values, and then divide by with plain Text 512 byte
CLOCKS_PER_SEC (the number of clock ticks per
second) to get approximate time taken by processor The Similarly for 192 and 256 bit key size is 2 msec which
code for the program is as follows. is shown in Figure 3.
#include <time.h> As mentioned in paper “Performance Analysis of
clock_t begin = clock(); CLEFIA, PICCOLO, TWINE Lightweight Block
/* here, do your time-consuming job */ Ciphers in IoT Environment “ [26], the time required
clock_t end = clock(); for 128 bit key size having plain text size 512 byte is
double time_spent = (double)(end - begin) / 12.329 mili second having CPU speed (Clock /cycle)
84 MHz, hence for laptop having CPU Speed of 2.10
CLOCKS_PER_SEC;
GHz, The exection time is approximately is of 2 mili
printf ("%f\n", time_spent); second.
The Result obtained from execution on Laptop having From the Figure 4 it is seen that total Exection Time
configuration- x64 based PC having RAM - 4GB, OS- for CLEFIA (128, 192 256 bit key size) with plain
MS Window 10 pro, Processor- Intel (R) Core™ i3-8145 Text 512 byte is 6 milisec.
CPU at 2.10 GHz with Microsoft Visual Studio is as
shown in following Figures 1,2,3 for different key size.

Figure 4: Total Exection Time for CLEFIA (128, 192


256 bit key size) with plain Text 512 byte

IV- CONCLUSION

After studying the Memory usage and execution time


Figure 2 Exection Time for CLEFIA 128 bit key size of CLEFIA algorithm, it is concluded that the as the
with plain Text 512 byte plaintext size increases encryption is increasing
From the Figure 2 the calculated time for 128 bit key rapidly. This happens because of the block cipher
size is 2 microsec. employs two feistal function and two diffusion

21
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23

International Journal of Innovations in Engineering and Science, www.ijies.net

matrixes. In the decryption process same two feistal 5386-4008-1/17/$31.00 ©2017 IEEE. pp. 1-7
function and two diffusion matrixes are used in similar 2017.
fashion with only changes made to the order of round [8] Ahmer Khan Jadoon , Licheng Wang , Tong Li ,
keys and whitening keys selection. and Muhammad Azam Zia ,”Review Article
Lightweight Cryptographic Techniques for
REFERENCES Automotive Cybersecurity ”, Hindawi Wireless
Communications and Mobile Computing Volume
2018, Article ID 1640167, pp 1-15, 26 June
[1] Avinash Kak “Some Basic Vocabulary of 2018.
Computer and Network Security and a Brief [9] Shehnaz T. Patel,Nita H. Mistry,”A Survey:
Review of Classical Encryption Techniques Lightweight Cryptography in WSN” IEEE
Lecture Notes on Computer and Network International Conference on Communication
Security, Purdue University 18 April, 2018. Networks (ICCN) 2015, IEEE Proceeding ISSN
[2] Sattar B.Sadkhan, Akbal O. Salman “A Survey on 978-I-S090-00S 1-7I 1S/$3 1.00©2015 IEEE, DOl
Lightweight-Cryptography Status and Future 1O.l 109/ICCN.20IS.3. pp 11-15,2015.
Challenges”, International Conference on [10] Oscar Delgado-Mohatar , Amparo Fúster-
Advances in Sustainable Engineering and Sabater, Jose M. Sierra ,”A light-weight
Applications (ICASEA), Wasit University, Kut, authentication scheme for wireless sensor
Iraq. IEEE Conference proceeding, ISSN 978-1- networks” , Journal of Elsevier B.V, ISSN 1570-
5386-3540-7/18/31.00$©2018 IEEE, 2018. 8705/$. doi:10.1016/j.adhoc.2010.08.020, pp 727-
pp.105-108. June 2018. 735, 8 September2010.
[3] Thomas Eisenbarth Sandeep Kumar Christof [11] Khalid Mahmood, Shehzad Ashraf Chaudhry,
Paar and Axel Poschmann “A Survey of Husnain Naqvi Taeshik Shon , Hafiz Farooq
Lightweight-Cryptography Implementations” Ahmad “A lightweight message authentication
IEEE proceeding on IEEE Design & Test of scheme for Smart Grid communications in power
Computers, Co published by the IEEE CS and the sector” , Journal of Elsevier B.V Computers and
IEEE CASS, ISSN 0740-7475/07/$25.00 G 2007 Electrical Engineering ,0045-7906/©2016
IEEE, pp 1-12,4 October 2017. Elsevier Ltd .pp 1-11,07 March 2016.
[4] Yulong Zou, Jia Zhu, XianbinWang and Lajos [12] Rajani Devi.T, “Importance of Cryptography in
Hanzo, “A Survey on Wireless Security Technical Network Security”, IEEE Proceeding ISSN 978-0-
Challenges, Recent Advances, and Future 7695-4958-3/13 $26.00 © 2013 IEEE, IEEE
Trends” Proceedings of the IEEE Volume 104, Computer Society, DOI
No. 9, Digital Object Identifier: 10.1109/CSNT.2013.102,pp 462-467, 2013.
10.1109/JPROC.2016.2558521, pp 1727-1765 [13] Masanobu Katagi and Shiho Moriai,
September 2016. “Lightweight Cryptography for the Internet of
[5] Gaurav Bansod, Nishchal Raval and Narayan Things”, White paper by Sony Corporation, pp 1-
Pisharoty “Implementation of a New Lightweight 4.
Encryption Design for Embedded Security” IEEE [14] Lara-Ni, Carlos Andres, Morales-Sandoval,
Transactions on Information Forensics And Miguel and Dıaz-Perez “An evaluation of AES
Security, Vol. 10, No. 1, ISSN 1556-6013 © 2014 and PRESENT ciphers for lightweight
IEEE, DOI10.1109/TIFS.2014.2365734 pp,142- cryptography on smart phones”, IEEE
151 January 2015. Proceeding ISSN 978-1-5090-0079-1/16/$31.00
[6] Pradeep Semwal, Mahesh Kumar Sharma ©2016 IEEE, pp 87-93, 2016.
“Comparative Study of Different Cryptographic [15] Charalampos Manifavas , George Hatzivasilis ,
Algorithms for Data Security in Cloud Konstantinos Fysarakis , and Konstantinos
Computing” ISSN 978-15090-6403-8/17/$31.00 Rantos “Lightweight Cryptography for Embedded
© 2017 IEEE pp.1-7, 2017. Systems - A Comparative Analysis” White paper
[7] Sarika Y. Bonde ,Dr. U. S. Bhadade, “Analysis of by Dept. of Applied Informatics & Multimedia,
Encryption Algorithms (RSA, SRNN and 2 key Technological Educational Institute of Crete,
pair) for Information Security” ISSN 978-1- Heraklion, Crete, Greece, pp 1-10.

22
https://doi.org/10.46335/IJIES.2023.8.3.4 e-ISSN: 2456-3463
Vol. 8 , No. 3, 2023, PP. 19- 23

International Journal of Innovations in Engineering and Science, www.ijies.net

[16] Axel York Poschmann Bochum, “LIGHTWEIGHT [25] Bora Aslan Fusun Yavuzer Aslan and M. Tolga
CRYPTOGRAPHY -Cryptographic Engineering Sakallı “Energy Consumption Analysis of
for a Pervasive World “ Thesis ,Faculty of Lightweight Crypto graphic Algorithms That Can
Electrical Engineering and Information Be Used in the Security of Internet of Things
Technology RuhrUniversity Bochum, Germany. Applications” Research Article Hindawi Security
pp 1-5, February 2009. and Communication Networks, Volume 2020,
[17] Kerry A. McKay ,LarryBassham, Meltem Sonmez Article ID 8837671, 15 pages
Turan , Nicky Mouha “Report on Lightweight [26] Levent Ertaul, Sachin Kattepura Rajegowda
Cryptography” NISTIR 8114,National Institute of California State University East Bay, Hayward,
Standards and Technology U.S. Department of CA, USA.” Performance Analysis of CLEFIA,
Commerce, Internal Report 8114 pp-1-14 March PICCOLO, TWINE Lightweight Block Ciphers in
2017. IoT Environment”. International Conference on
[18] Tetsu Iwata “The 128-bit Block cipher CLEFIA Security and Management. ISBN: 1-60132-467-7.
Design Rationale” Report on development of CSREA PRESS. Pp 25-31
CLEFIA by Sony Corporation, Konan, Minato-ku, [27] Vishal A. Thakor, Mohammad Abdur Razzaque
Tokyo 108-0075 Japan June 1, 2007. (Member, IEEE), Muhammad R. A. Khandaker
[19] Madhumita Panda “Performance Analysis of (Senior Member, IEEE) “Lightweight
Encryption Algorithms for Security” International Cryptography Algorithms for Resource-
conference on Signal Processing, Constrained IoT Devices: A Review, Comparison
Communication, Power and Embedded System and Research Opportunities”
(SCOPES)-2016 IEEE Proceeding ISSN 978-1- [28] IEEE Access, date of publication January 19,
5090-4620-1/16/$31.00 ©2016 IEEE, pp 278- 2021, date of current version February 22,
284, 2016. 2021.Volume 9 2021, pp 28177-28193.
[20] Chaitra B, Kiran Kumar V. G, Shatharama Rai
“A Survey on Various Lightweight Cryptographic
Algorithms on FPGA” IOSR Journal of
Electronics and Communication Engineering
(IOSR-JECE) e-ISSN: 2278-2834,p- ISSN: 2278-
8735.Volume 12, Issue 1, Ver. II (Jan.-Feb. 2017),
PP 54-59
[21] Jaber Hossein Zadeh,Abbas Ghaemi Bafghi
“Evaluation of Lightweight Block Ciphers in
Hardware Implementation: A Comprehensive
Survey”2016 1st International Conference on
New Research Achievements in Electrical and
Computer Engineering.
[22] Levent Ertaul, Sachin Kattepura Rajegowda
“Performance Analysis of CLEFIA, PICCOLO,
TWINE Lightweight Block Ciphers in IoT
Environment” International Conference on
Security and Management SAM'17, ISBN: 1-
60132-467-7, CSREA Press ©, Pp 25-31.
[23] Taizo Shirai, Kyoji Shibutani, Toru Akishita,
Shiho Moriai, and Tetsu Iwata “The 128-bit Block
cipher CLEFIA”(Extended Abstract), Sony
Corporation, Konan, Minato-ku, Tokyo 108-0075
Japan June 1, 2007.
[24] Tetsu Iwata of Nagoya University, The 128-bit
Block cipher CLEFIA Algorithm Speciation,
Revision 1.0June 1, 2007.

23

View publication stats

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy