PRINCE: a low-latency block cipher for pervasive computing applications

  • Authors:
  • Julia Borghoff;Anne Canteaut;Tim Güneysu;Elif Bilge Kavun;Miroslav Knezevic;Lars R. Knudsen;Gregor Leander;Ventzislav Nikov;Christof Paar;Christian Rechberger;Peter Rombouts;Søren S. Thomsen;Tolga Yalçın

  • Affiliations:
  • Technical University of Denmark, Denmark;Technical University of Denmark, Denmark, INRIA, France;Ruhr-University Bochum, Germany;Ruhr-University Bochum, Germany;NXP Semiconductors, Leuven, Belgium;Technical University of Denmark, Denmark;Technical University of Denmark, Denmark;NXP Semiconductors, Leuven, Belgium;Ruhr-University Bochum, Germany;Technical University of Denmark, Denmark;NXP Semiconductors, Leuven, Belgium;Technical University of Denmark, Denmark;Ruhr-University Bochum, Germany

  • Venue:
  • ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper presents a block cipher that is optimized with respect to latency when implemented in hardware. Such ciphers are desirable for many future pervasive applications with real-time security needs. Our cipher, named PRINCE, allows encryption of data within one clock cycle with a very competitive chip area compared to known solutions. The fully unrolled fashion in which such algorithms need to be implemented calls for innovative design choices. The number of rounds must be moderate and rounds must have short delays in hardware. At the same time, the traditional need that a cipher has to be iterative with very similar round functions disappears, an observation that increases the design space for the algorithm. An important further requirement is that realizing decryption and encryption results in minimum additional costs. PRINCE is designed in such a way that the overhead for decryption on top of encryption is negligible. More precisely for our cipher it holds that decryption for one key corresponds to encryption with a related key. This property we refer to as α-reflection is of independent interest and we prove its soundness against generic attacks.