Computer Science ›› 2017, Vol. 44 ›› Issue (2): 192-194, 201.doi: 10.11896/j.issn.1002-137X.2017.02.030

Previous Articles     Next Articles

VHF:A Lightweight Block Cipher Based on Dual Pseudo-random Transformation and Feistel Structure

DAI Xue-jun, HUANG Yu-hua and LIU Ning-zhong   

  • Online:2018-11-13 Published:2018-11-13

Abstract: A new lightweight block cipher based on double pseudo random transform and Feistel structure called VHF was proposed for the demand of the resource constrained mobile terminal for the lightweight cipher.Similar to many other lightweight block ciphers,the block size of VHF is 128bit and the key size is 80bit and 128bit.Security evaluation of VHF shows that VHF can achieve enough security margin against known attacks,such as differential cryptanalysis,linear cryptanalysis,and impossible differential cryptanalysis etc.Furthermore,VHF can be implemented efficiently not only in hardware environments but also in software platforms such as 8bit microcontroller.The implementation efficiency of both software and hardware based on VHF is higher than CLEFIA algorithm,which is the international standard also oriented to 8bit platform.

Key words: Lightweight block cipher,Hardware efficiency,Cryptanalysis

[1] DAEMEN J,RIJMEN V.The design of Rijndael:AES-the advanced encryption standard [M].Berlin Heidelberg:Springer,2002:10-18.
[2] SHIRAI T,SHIBUTANI K,AKISHITA T,et al.The 128-bitBlockcipher CLEFIA,2007[C]∥Proceedings of the 14th International Conference on Fast Software Encryption.Berlin Heidelberg:Springer,2007:181-195.
[3] BOGDANOV A,KNUDSEN L R,LEADER G,et al.PRES-ENT:An ultra-lightweight block cipher [J].Lecture Notes in Computer Science,2007:450-466.
[4] WU W L,FENG D G,ZHANG W T.Design and analysis of Block cipher [M].Beijing:TsingHua University Press,2009:5-20.(in Chinese) 吴文玲,冯登国,张文涛.分组密码的设计与分析[M].北京:清华大学出版社,2009:5-20.
[5] IZADI M,SADGHIYAN B,SADEGHIAN S S,et al.MIBS:anew lightweight block cipher[C]∥International Conference on Cryptology and Network Security Berlin Heidelberg:Springer,2009:334-348.
[6] BIHAM E,SHAMIR A.Differential cryptanalysis of the dataencryption standard [M].New York:Springer-Verlag,1993.
[7] MATSUI M.Linear Cryptanalysis Method for DES Cipher,2007[M].Berlin Heidelberg:Springer,1994:386-397.
[8] BIHAM E,BIRYUKOV A,SHAMIR A.Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials,1999[M].Berlin Heidelberg:Springer,1999:12-23.
[9] KIM J,HONG S,SUNG J,et al.Impossible Differential Crypta-nalysis for Block Cipher Structures[J].Lecture Notes in Computer Science,2003,2904:82-96.

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .