KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers

Christophe De Cannière, Orr Dunkelman, Miroslav Knežević

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers share the 80-bit key size and security level. The first flavor, KATAN, is composed of three block ciphers, with 32, 48, or 64-bit block size. The second flavor, KTANTAN, contains the other three ciphers with the same block sizes, and is more compact in hardware, as the key is burnt into the device (and cannot be changed). The smallest cipher of the entire family, KTANTAN32, can be implemented in 462 GE while achieving encryption speed of 12.5 KBit/sec (at 100 KHz). KTANTAN48, which is the version we recommend for RFID tags uses 588 GE, whereas KATAN64, the largest and most flexible candidate of the family, uses 1054 GE and has a throughput of 25.1 Kbit/sec (at 100 KHz).

Original languageEnglish
Title of host publicationCryptographic Hardware and Embedded Systems - CHES 2009 - 11th International Workshop, Proceedings
Pages272-288
Number of pages17
DOIs
StatePublished - 2009
Externally publishedYes
Event11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009 - Lausanne, Switzerland
Duration: 6 Sep 20099 Sep 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5747 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference11th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2009
Country/TerritorySwitzerland
CityLausanne
Period6/09/099/09/09

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers'. Together they form a unique fingerprint.

Cite this