{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T03:46:24Z","timestamp":1772509584551,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T00:00:00Z","timestamp":1696464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001501","name":"University Grants Commission","doi-asserted-by":"publisher","award":["190520461818"],"award-info":[{"award-number":["190520461818"]}],"id":[{"id":"10.13039\/501100001501","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of security to diverse Internet of Things applications running on low-end constrained devices. Therefore, an efficient hardware design approach that requires some specific hardware resource may not be efficient if implemented in software. Substitution bit Permutation Network based ciphers such as PRESENT and GIFT are efficient, lightweight cryptographic hardware design approaches. These ciphers introduce confusion and diffusion by employing a 4\u2009\u00d7\u20094 static substitution box and bit permutations. The bit-wise permutation is realised by simple rerouting, which is most cost-effective to implement in hardware, resulting in negligible power consumption. However, this method is highly resource-consuming in software, particularly for large block-sized ciphers, with each single-bit permutation requiring multiple sub-operations. This paper proposes a novel software-based design approach for permutation operation in Substitution bit Permutation Network based ciphers using a bit-banding feature. The conventional permutation using bit rotation and the proposed approach have been implemented, analysed and compared for GIFT and PRESENT ciphers on ARM Cortex-M3-based LPC1768 development platform with KEIL MDK used as an Integrated Development Environment. The real-time performance comparison between conventional and the proposed approaches in terms of memory (RAM\/ROM) footprint, power, energy and execution time has been carried out using ULINKpro and ULINKplus debug adapters for various code and speed optimisation scenarios. The proposed approach substantially reduces execution time, energy and power consumption for both PRESENT and GIFT ciphers, thus demonstrating the efficiency of the proposed method for Substitution bit Permutation Network based symmetric block ciphers.<\/jats:p>","DOI":"10.1186\/s42400-023-00174-9","type":"journal-article","created":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T02:01:54Z","timestamp":1696471314000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["An efficient permutation approach for SbPN-based symmetric block ciphers"],"prefix":"10.1186","volume":"6","author":[{"given":"Mir","family":"Nazish","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8504-5061","authenticated-orcid":false,"given":"M. Tariq","family":"Banday","sequence":"additional","affiliation":[]},{"given":"Insha","family":"Syed","sequence":"additional","affiliation":[]},{"given":"Sheena","family":"Banday","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,5]]},"reference":[{"key":"174_CR1","unstructured":"Ashton K (2009) That \u2018Internet of Things\u2019 Thing. RFID J 22:97\u2013114"},{"key":"174_CR2","doi-asserted-by":"publisher","first-page":"427","DOI":"10.46586\/tches.v2020.i3.402-427","volume":"402","author":"A Adomnicai","year":"2020","unstructured":"Adomnicai A, Najm Z, Peyrin T (2020) Fixslicing: a new GIFT representation. IACR Trans Cryptogr Hardw Embed Syst 402:427. https:\/\/doi.org\/10.46586\/tches.v2020.i3.402-427","journal-title":"IACR Trans Cryptogr Hardw Embed Syst"},{"key":"174_CR3","doi-asserted-by":"crossref","unstructured":"Adomnicai A, Peyrin T (2020) Fixslicing AES-like ciphers. IACR Trans Cryptogr Hardw Embed Syst:402\u2013425","DOI":"10.46586\/tches.v2021.i1.402-425"},{"key":"174_CR4","unstructured":"Avik Chakraborti MN, Datta N, Jha A (2019) HyENA, NIST lightweight cryptography project. https:\/\/csrc.nist.gov\/Projects\/Lightweight-Cryptography\/Round-1-Candidates"},{"key":"174_CR5","doi-asserted-by":"crossref","unstructured":"Avik Chakraborti CML, Datta N, Jha A, Mancillas-LopezAvik Chakraborti C, Datta N, Jha A, Mridul Nandi YS (2020) ESTATE: a lightweight and low energy authenticated encryption mode. IACR Trans Symmetric Cryptol:350\u2013389","DOI":"10.46586\/tosc.v2020.iS1.350-389"},{"key":"174_CR6","unstructured":"Avik Chakraborti CML, Datta N, Jha A, Mridul Nandi YS (2019) LOTUS-AEAD and LOCUS-AEAD, Technical report, First-round submission to the NIST Lightweight Cryptography Competition"},{"key":"174_CR7","doi-asserted-by":"publisher","DOI":"10.1002\/9781119058397","volume-title":"Practical microcontroller engineering with ARM\u00ae technology","author":"Y Bai","year":"2015","unstructured":"Bai Y (2015) Practical microcontroller engineering with ARM\u00ae technology. Wiley"},{"key":"174_CR8","doi-asserted-by":"publisher","DOI":"10.1145\/3231053.3231074","author":"MT Banday","year":"2018","unstructured":"Banday MT (2018) A study of current trends in the design of processors for the Internet of Things. ACM Int Conf Proc Ser. https:\/\/doi.org\/10.1145\/3231053.3231074","journal-title":"ACM Int Conf Proc Ser"},{"key":"174_CR9","first-page":"411","volume":"9453","author":"S Banik","year":"2015","unstructured":"Banik S et al (2015) Midori\u202f: a block cipher for low energy ( extended version ). Int Conf Theory Appl Cryptol Inf Secur 9453:411\u2013436","journal-title":"Int Conf Theory Appl Cryptol Inf Secur"},{"key":"174_CR10","doi-asserted-by":"crossref","unstructured":"Banik S, Pandey SK, Peyrin T, Sasaki Y, Sim SM, Todo Y (2017) GIFT: a small present. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 10529 LNCS, 2017, pp 321\u2013345","DOI":"10.1007\/978-3-319-66787-4_16"},{"key":"174_CR11","unstructured":"Banik S et al (2019a) Gift-cofb v1.0. NIST lightweight cryptography project. pp 1\u201330. https:\/\/csrc.nist.gov\/Projects\/lightweight-cryptography\/round-2-candidates"},{"key":"174_CR12","unstructured":"Banik S et al (2019b) Sundae-gift. Submiss. to Round 1, vol 1, pp 1\u201322"},{"key":"174_CR13","unstructured":"Beaulieu R, Shors D, Smith J, Treatman-Clark S, Weeks B, Wingers L (2015) Simon and speck: block ciphers for the internet of things. In: Proceedings of the 52nd annual design automation conference on\u2014DAC \u201915, no. July. pp 1\u20136. http:\/\/dl.acm.org\/citation.cfm?doid=2744769.2747946"},{"key":"174_CR14","doi-asserted-by":"crossref","unstructured":"Benadjila R, Guo J, Lomn\u00e9 V, Peyrin T (2014) Implementing lightweight block ciphers on x86 architectures. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 8282 LNCS, pp 324\u2013351","DOI":"10.1007\/978-3-662-43414-7_17"},{"key":"174_CR15","doi-asserted-by":"crossref","unstructured":"Biham E (1997) A fast new DES implementation in software. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 1267, pp 260\u2013272","DOI":"10.1007\/BFb0052352"},{"key":"174_CR16","doi-asserted-by":"crossref","unstructured":"Biham E, Anderson R, Knudsen L (1998) Serpent: a new block cipher proposal. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 1372, pp 222\u2013238","DOI":"10.1007\/3-540-69710-1_15"},{"key":"174_CR17","first-page":"129","volume":"3","author":"A Biryukov","year":"2006","unstructured":"Biryukov A, Canni\u00e8re C (2006) Data encryption standard (DES). Encycloped Cryptogr Secur 3:129\u2013135","journal-title":"Encycloped Cryptogr Secur"},{"key":"174_CR18","first-page":"10","volume":"2007","author":"A Bogdanov","year":"2007","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A (2007) PRESENT\u202f: an ultra-lightweight block cipher. Cryptogr Hardw Embed Syst 2007:10\u201313","journal-title":"Cryptogr Hardw Embed Syst"},{"key":"174_CR19","doi-asserted-by":"crossref","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A (2007) PRESENT\u202f: an ultra-lightweight block cipher. In: Proc. 9th international workshop on cryptographic hardware and embedded systems (CHES 2007), Vienna, Austria, pp 450\u2013466","DOI":"10.1007\/978-3-540-74735-2_31"},{"issue":"10","key":"174_CR20","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-34961-4_14","volume":"7658","author":"J Borghoff","year":"2012","unstructured":"Borghoff J et al (2012) PRINCE: a low-latency block cipher for pervasive computing applications. Lect Not Comput Sci Inlude Subser Lect Not Artif Intell Lect Not Bioinform 7658(10):208\u2013225. https:\/\/doi.org\/10.1007\/978-3-642-34961-4_14","journal-title":"Lect Not Comput Sci Inlude Subser Lect Not Artif Intell Lect Not Bioinform"},{"key":"174_CR21","doi-asserted-by":"crossref","unstructured":"Boyar J, Peralta R (2010) A new combinational logic minimization technique with applications to cryptology. In: Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 6049 LNCS, no 2, pp 178\u2013189","DOI":"10.1007\/978-3-642-13193-6_16"},{"issue":"3","key":"174_CR22","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s13389-018-0193-x","volume":"9","author":"D Dinu","year":"2019","unstructured":"Dinu D, Le Corre Y, Khovratovich D, Perrin L, Gro\u00dfsch\u00e4dl J, Biryukov A (2019) Triathlon of lightweight block ciphers for the Internet of things. J Cryptogr Eng 9(3):283\u2013302. https:\/\/doi.org\/10.1007\/s13389-018-0193-x","journal-title":"J Cryptogr Eng"},{"key":"174_CR40","unstructured":"Forouzan D, Behrouz A, Mukhopadhyay D (2015) Cryptography and network security. Mc Graw Hill Education (India) Private Limited New York, NY, USA"},{"key":"174_CR23","unstructured":"Heys HM (2020) A tutorial on the implementation of block ciphers: software and hardware applications. In: IACR Cryptol. ePrint Arch, p 1545. https:\/\/eprint.iacr.org\/2020\/1545"},{"key":"174_CR24","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-642-40392-7_2","volume":"8162","author":"F Karako\u00e7","year":"2013","unstructured":"Karako\u00e7 F, Demirci H, Harmanci AE (2013) ITUbee: a software oriented lightweight block cipher. Lect Not Comput Sci 8162:16\u201327. https:\/\/doi.org\/10.1007\/978-3-642-40392-7_2","journal-title":"Lect Not Comput Sci"},{"key":"174_CR25","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1007\/978-3-031-08896-4_23","volume":"13218","author":"H Kim","year":"2022","unstructured":"Kim H et al (2022) SPEEDY on\u00a0Cortex\u2013M3: efficient software implementation of\u00a0SPEEDY on\u00a0ARM Cortex\u2013M3. Lect Notes Comput Sci 13218:434\u2013444. https:\/\/doi.org\/10.1007\/978-3-031-08896-4_23","journal-title":"Lect Notes Comput Sci"},{"key":"174_CR26","unstructured":"Kwan M (2000) Reducing the gate count of Bitslice DES. IACR Cryptol. ePrint Arch., vol. 2000, p 51. http:\/\/dblp.uni-trier.de\/db\/journals\/iacr\/iacr2000.html#Kwan00"},{"issue":"1","key":"174_CR27","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/2.19825","volume":"22","author":"RB Lee","year":"1989","unstructured":"Lee RB (1989) Precision architecture. Comput Long Beach Calif 22(1):78\u201391. https:\/\/doi.org\/10.1109\/2.19825","journal-title":"Comput Long Beach Calif"},{"key":"174_CR28","doi-asserted-by":"crossref","unstructured":"Matsui M, Nakajima J (2007) On the power of bitslice implementation on intel core2 processor. In: Cryptographic hardware and embedded systems: CHES 2007, vol. 4727 LNCS, Berlin, Heidelberg: Springer Berlin Heidelberg, pp 121\u2013134","DOI":"10.1007\/978-3-540-74735-2_9"},{"key":"174_CR29","doi-asserted-by":"publisher","unstructured":"Nazish M, Banday MT (2018) Green Internet of Things: a study of technologies, challenges and applications. In: 2018 international conference on automation and computational engineering (ICACE), pp 210\u2013215. https:\/\/doi.org\/10.1109\/ICACE.2018.8686976","DOI":"10.1109\/ICACE.2018.8686976"},{"key":"174_CR30","volume-title":"Radio Frequency identification: security and privacy issues","author":"K Papapagiannopoulos","year":"2014","unstructured":"Papapagiannopoulos K (2014) Radio Frequency identification: security and privacy issues, vol 8651. Springer, Cham"},{"key":"174_CR31","unstructured":"Poschmann A (2009) Lightweight cryptography: cryptographic engineering for a pervasive world. Ph. D. Thesis, no. February, pp 1\u2013197. http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary?doi=10.1.1.182.1450"},{"key":"174_CR32","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1007\/978-3-319-66787-4_31","volume":"10529","author":"TBS Reis","year":"2017","unstructured":"Reis TBS, Aranha DF, L\u00f3pez J (2017) PRESENT runs fast: efficient and secure implementation in software. Lect Not Comput Sci 10529:644\u2013664. https:\/\/doi.org\/10.1007\/978-3-319-66787-4_31","journal-title":"Lect Not Comput Sci"},{"key":"174_CR33","doi-asserted-by":"publisher","first-page":"100565","DOI":"10.1016\/j.iot.2022.100565","volume":"19","author":"A Rejeb","year":"2022","unstructured":"Rejeb A, Rejeb K, Simske S, Treiblmaier H, Zailani S (2022) The big picture on the internet of things and the smart city: a review of what we know and what we need to know. Internet Things 19:100565. https:\/\/doi.org\/10.1016\/j.iot.2022.100565","journal-title":"Internet Things"},{"key":"174_CR34","doi-asserted-by":"publisher","unstructured":"Rouf M, Nazish M, Sultan I, Banday MT (2022) Implementation of area and power optimised ARM cortex-M cores on FPGA. In: 2022 smart technologies, communication and robotics (STCR), pp 1\u20136. https:\/\/doi.org\/10.1109\/STCR55312.2022.10009282","DOI":"10.1109\/STCR55312.2022.10009282"},{"key":"174_CR35","doi-asserted-by":"crossref","unstructured":"Schwabe P, Stoffelen K (2017) All the AES you need on cortex-M3 and M4. In: Lecture Notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics), vol 10532 LNCS, pp 180\u2013194","DOI":"10.1007\/978-3-319-69453-5_10"},{"key":"174_CR36","unstructured":"Shannon CE (1945) A mathematical theory of cryptography. https:\/\/www.iacr.org\/museum\/shannon45.html"},{"key":"174_CR37","volume-title":"ARM microprocessor systems cortex-M architecture, programming, and interfacing","author":"M Tahir","year":"2017","unstructured":"Tahir M, Javed K (2017) ARM microprocessor systems cortex-M architecture, programming, and interfacing. CRC Press"},{"key":"174_CR38","doi-asserted-by":"crossref","unstructured":"Yiu J (2014) The definitive guide to ARM Cortex-M3 and cortex-M4 processors. 3rd edition. Newnes, Cambridge, pp 45\u201355, vol 4, no 1. Elsevier","DOI":"10.1016\/B978-0-12-408082-9.00001-4"},{"key":"174_CR39","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5459-7","author":"W Zhang","year":"2015","unstructured":"Zhang W, Bao Z, Lin D, Rijmen V, Yang B, Verbauwhede I (2015) RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms. Sci China Inf Sci. https:\/\/doi.org\/10.1007\/s11432-015-5459-7","journal-title":"Sci China Inf Sci"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00174-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-023-00174-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-023-00174-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,5]],"date-time":"2023-10-05T02:02:46Z","timestamp":1696471366000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-023-00174-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,5]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,12]]}},"alternative-id":["174"],"URL":"https:\/\/doi.org\/10.1186\/s42400-023-00174-9","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,5]]},"assertion":[{"value":"28 March 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"This article does not contain any studies with human participants or animals performed by any authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal rights"}}],"article-number":"42"}}