• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Cao Meichun, Zhang Wenying, Chen Yanqin, Xing Zhaohui, Wu Lei. RAIN: A Lightweight Block Cipher Towards Software, Hardware and Threshold Implementations[J]. Journal of Computer Research and Development, 2021, 58(5): 1045-1055. DOI: 10.7544/issn1000-1239.2021.20200933
Citation: Cao Meichun, Zhang Wenying, Chen Yanqin, Xing Zhaohui, Wu Lei. RAIN: A Lightweight Block Cipher Towards Software, Hardware and Threshold Implementations[J]. Journal of Computer Research and Development, 2021, 58(5): 1045-1055. DOI: 10.7544/issn1000-1239.2021.20200933

RAIN: A Lightweight Block Cipher Towards Software, Hardware and Threshold Implementations

Funds: This work was supported by the National Natural Science Foundation of China (61672330) and the Natural Science Foundation of Shandong Province of China (ZR2020KF011, ZR2020MF056).
More Information
  • Published Date: April 30, 2021
  • The lightweight block cipher RAIN proposed in this paper is based on the SPN(substitution permutation network) structure widely used in international block cipher design. It provides strong avalanche utility through iterative confusion layer S-box and diffusion layer, which not only guarantees strong security, but also takes into account the implementation of software and hardware. The algorithm supports 64b block and 128b block. Two different block lengths are implemented using the same round function structure, and the scheme is simple and beautiful. The confusion layer is implemented using a 4b S-box. When the S-box is implemented, not only its security is considered, but also the software and hardware implementation of the S-box is considered. The hybrid operation of the diffusion layer provides high implementation performance. We evaluated the algorithm and give differential analysis, impossible differential analysis, integral attack and invariant subspace analysis. In the process of analysis, we combined some of the latest analysis methods and automated search based on MILP. Our algorithm can resist the existing analysis methods, and has greater safety redundancy. RAIN algorithm is efficient on software and hardware implementation, and it has excellent performance on PC, ARM platform and hardware FPGA platform. The algorithm S-box can be converted into basic logic operations, and the cost of resisting side channel attacks is low.
  • Related Articles

    [1]Sun Ying, Zhang Yuting, Zhuang Fuzhen, Zhu Hengshu, He Qing, Xiong Hui. Interpretable Salary Prediction Algorithm Based on Set Utility Marginal Contribution Learning[J]. Journal of Computer Research and Development, 2024, 61(5): 1276-1289. DOI: 10.7544/issn1000-1239.202330133
    [2]Cheng Haodong, Han Meng, Zhang Ni, Li Xiaojuan, Wang Le. Closed High Utility Itemsets Mining over Data Stream Based on Sliding Window Model[J]. Journal of Computer Research and Development, 2021, 58(11): 2500-2514. DOI: 10.7544/issn1000-1239.2021.20200554
    [3]Lu Feifei, Zhu Guiming, Tao Zhirong, Xie Xianghui, Guo Deke. MDCent:A Modular Data Center Interconnection with High Scalability and High Performance[J]. Journal of Computer Research and Development, 2015, 52(5): 1127-1136. DOI: 10.7544/issn1000-1239.2015.20140043
    [4]Wang Le, Feng Lin, Wang Shui. An Algorithm of Mining TOP-K High Utility Patterns Without Generating Candidates[J]. Journal of Computer Research and Development, 2015, 52(2): 445-455. DOI: 10.7544/issn1000-1239.2015.20131184
    [5]Tang Zhuo, Zhu Min, Yang Li, Tang Xiaoyong, Li Kenli. Random Task-Oriented User Utility Optimization Model in the Cloud Environment[J]. Journal of Computer Research and Development, 2014, 51(5): 1120-1128.
    [6]Zhu Xiaofei, Guo Jiafeng, Cheng Xueqi, and Lan Yanyan. A Two-Step Utility Query Recommendation Method Based on Absorbing Random Walk[J]. Journal of Computer Research and Development, 2013, 50(12): 2603-2611.
    [7]Han Jianjun, Wu Xiaodong, Li Qinghua. Energy-Efficient Real-Time Scheduling Algorithm with Accrual Utility under Energy Bounds[J]. Journal of Computer Research and Development, 2011, 48(2): 327-337.
    [8]Sun Wei, Wen Tao, Feng Ziqin, Guo Quan. Steady State Throughput Modeling of TCP NewReno[J]. Journal of Computer Research and Development, 2010, 47(3): 398-406.
    [9]Yang Shanlin, Ding Shuai, and Chu Wei. Trustworthy Software Evaluation Using Utility Based Evidence Theory[J]. Journal of Computer Research and Development, 2009, 46(7): 1152-1159.
    [10]Jiang Weijin, Wang Pu. Research on a Grid Resource Allocation Algorithm Based on MAS Non-Cooperative Bidding Game[J]. Journal of Computer Research and Development, 2007, 44(1): 29-36.

Catalog

    Article views (546) PDF downloads (358) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return