{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:48:53Z","timestamp":1754160533753,"version":"3.41.2"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T00:00:00Z","timestamp":1753574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>A controller area network (CAN, ISO-11898:2003) is the central nervous system of contemporary, high-tech vehicles, which links electronic control units (ECUs) to offer a distinctive driving experience through data communication. We propose a lightweight cryptographic algorithm SCAN-C with a unique architecture to secure data communication over the CAN bus in contemporary vehicles. It is a 64-bit block cipher supporting a 160-bit primary key with 12 iterative rounds. The proposed algorithm has a unique hybrid architecture with two structural combinations. The key generation schedule has multiplexers, linear feedback shift registers, and a nonlinear function. The encryption schedule has a Feistel and uniform substitution-permutation network. The decryption schedule is the same as the encryption, with keys applied in reverse order. The innovative architecture of SCAN-C exhibits low consumption of resources (1197 gate equivalents to implement in hardware), better security with low iterative rounds, and optimal energy efficiency. The experimental results suggest that the SCAN-C is suitable for implementation in hardware and software.<\/jats:p>","DOI":"10.1186\/s42400-024-00291-z","type":"journal-article","created":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T03:02:06Z","timestamp":1753585326000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SCAN-C: a lightweight cryptographic algorithm to secure CAN communications in modern vehicles"],"prefix":"10.1186","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3799-0058","authenticated-orcid":false,"given":"Nagaraj","family":"Hediyal","sequence":"first","affiliation":[]},{"given":"B. P.","family":"Divakar","sequence":"additional","affiliation":[]},{"given":"K.","family":"Narayanaswamy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,27]]},"reference":[{"key":"291_CR1","doi-asserted-by":"publisher","unstructured":"Aboshosha B, Ramadan RA, Dwivedi AD, El-Sayed A, Dessouky MM (2020) SLIM: a lightweight block cipher for internet of health things. Special section on lightweight sceurity and provenance for internet of health things. IEEE Access 2020. https:\/\/doi.org\/10.1109\/Access.2020.3036589.","DOI":"10.1109\/Access.2020.3036589"},{"issue":"1","key":"291_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/S0045-7906(96)00020-1","volume":"23","author":"A Ahmad","year":"1997","unstructured":"Ahmad A, Elabdallai AM (1997) An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences. Comput Electron Eng 23(1):33\u201339","journal-title":"Comput Electron Eng"},{"key":"291_CR3","doi-asserted-by":"publisher","unstructured":"Alshammari AS (2020) A stream cipher generator based on a combination of two non-linear systems for secure signal transmissions. Przegl\u0105d Elektrotechniczny, ISSN 0033-2097, R. 96 NR 10\/2020. https:\/\/doi.org\/10.15199\/48.2020.10.09","DOI":"10.15199\/48.2020.10.09"},{"issue":"31","key":"291_CR4","first-page":"1694","volume":"8","author":"M Bakhtiari","year":"2011","unstructured":"Bakhtiari M, Maarof MA (2011) An efficient stream cipher algorithm for data encryption. IJCSI Int J Comput Sci Issues 8(31):1694\u20131814","journal-title":"IJCSI Int J Comput Sci Issues"},{"key":"291_CR5","doi-asserted-by":"publisher","first-page":"5238","DOI":"10.1002\/sec.1692","volume":"9","author":"G Bansod","year":"2016","unstructured":"Bansod G, Patil A, Sutar S, Pishorpty N (2016) ANU: an ultra-lightweight cipher design for security in IoT. Security Commun Netw 9:5238\u20135251. https:\/\/doi.org\/10.1002\/sec.1692","journal-title":"Security Commun Netw"},{"key":"291_CR6","unstructured":"Barker E, Barker WC Guideline for using cryptographic standards in the federal government: directives, mandates and policies. NIST Special Publication 800-175A"},{"key":"291_CR7","unstructured":"Barreto P, Rijmen V (2000) The Khazad legacy-level block cipher. Primitive submitted to NSSIE, vol 97"},{"key":"#cr-split#-291_CR8.1","doi-asserted-by":"crossref","unstructured":"Biham E, Biryukov A, Shamir A (1999) Miss in the middle attacks on IDEA and Khufu. In: L Knudsen","DOI":"10.1007\/3-540-48519-8_10"},{"key":"#cr-split#-291_CR8.2","unstructured":"(ed) FSE'99, LNCS 1636, 1999. Springer, Berlin, pp 124-138"},{"issue":"1","key":"291_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A (1991) Differential cryptanalysis of DES-like cryptosystems. J Cryptol 4(1):3\u201372","journal-title":"J Cryptol"},{"key":"291_CR10","doi-asserted-by":"publisher","unstructured":"Bogdanov A, Knudsen LR, Leander G, Paar C, Poschmann A, Robshaw MJ, Seurin Y, Vikkelsoe C (2007) Present: an ultra-lightweight block cipher\". Lecture notes in computer science, vol 4727 (Cryptographic Hardware and Embedded Systems\u2013CHES 2007), pp 450\u2013466. https:\/\/doi.org\/10.1007\/978-3-540-74735-2_31","DOI":"10.1007\/978-3-540-74735-2_31"},{"key":"291_CR11","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s10623-012-9697-z","volume":"70","author":"A Bogdanov","year":"2014","unstructured":"Bogdanov A, Rijmen V (2014) Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des Codes Cryptogr 70:369\u2013383. https:\/\/doi.org\/10.1007\/s10623-012-9697-z","journal-title":"Des Codes Cryptogr"},{"key":"291_CR12","doi-asserted-by":"crossref","unstructured":"Boura C, Naya-Plasencia M, Suder V (2014) Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon (full version). Ph.D. thesis, IACR cryptology ePrint archive","DOI":"10.1007\/978-3-662-45611-8_10"},{"key":"291_CR13","doi-asserted-by":"publisher","first-page":"2364","DOI":"10.3390\/s20082364","volume":"20","author":"M Bozdal","year":"2020","unstructured":"Bozdal M, Samie M, Aslam S, Jennions I (2020) Evaluation of CAN bus security challenges. Sensors 20:2364. https:\/\/doi.org\/10.3390\/s20082364","journal-title":"Sensors"},{"key":"291_CR14","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.patrec.2020.04.038","volume":"135","author":"A Castiglione","year":"2020","unstructured":"Castiglione A, Palmieri F, Colace F, Lombardi M, Santaniello D, D\u2019Aniello G (2020) Securing the internet of vehicles through lightweight block ciphers. Pattern Recogn Lett 135:264\u2013270. https:\/\/doi.org\/10.1016\/j.patrec.2020.04.038","journal-title":"Pattern Recogn Lett"},{"key":"291_CR15","doi-asserted-by":"crossref","unstructured":"Daemen JR (2001a) The design of Rijndael. Springer, 2001","DOI":"10.1007\/978-3-662-04722-4"},{"key":"291_CR16","doi-asserted-by":"crossref","unstructured":"Daemen JR (2001b) The wide trail design strategy. Cryptography and coding, LNCS 2260. Springer, Berlin, pp 222\u2013238","DOI":"10.1007\/3-540-45325-3_20"},{"key":"291_CR17","doi-asserted-by":"crossref","unstructured":"Farag WA (2017) CANTrack: enhancing automotive CAN bus security using intuitive encryption algorithms. 978-1-5090-5454-1\/17\/$31.00 \u00a92017. IEEE","DOI":"10.1109\/ICMSAO.2017.7934878"},{"key":"291_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1186\/s42400-020-00066-2","volume":"4","author":"R Gao","year":"2021","unstructured":"Gao R, Li S, Gao Y, Guo R (2021) A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving. Cybersecurity 4:3. https:\/\/doi.org\/10.1186\/s42400-020-00066-2","journal-title":"Cybersecurity"},{"key":"291_CR19","doi-asserted-by":"crossref","unstructured":"Gmiden M, Gmiden MH, Trabelsi H (2019) Cryptographic and intrusion detection system for automotive CAN bus: survey and contributions. In: 2019 16th international multi-conference on systems, signals & devices (SSD'19), 978-1-7281-1820-8\/19\/$31.00 \u00a92019. IEEE","DOI":"10.1109\/SSD.2019.8893165"},{"key":"291_CR20","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.3390\/sym15081496","volume":"15","author":"L Gorlov","year":"2023","unstructured":"Gorlov L, Iavich M, Bocu R (2023) Linear layer architecture based on cyclic shift and XOR. Symmetry 15:1496. https:\/\/doi.org\/10.3390\/sym15081496","journal-title":"Symmetry"},{"key":"291_CR21","unstructured":"Heys HM (2017) A tutorial on linear and differential cryptanalysis. Crypto"},{"key":"291_CR22","doi-asserted-by":"publisher","first-page":"4398","DOI":"10.3390\/app13074398","volume":"13","author":"N Ibrahim","year":"2023","unstructured":"Ibrahim N, Agbinya J (2023) Design of a lightweight cryptographic scheme for resource-constrained internet of things devices. Appl Sci 13:4398. https:\/\/doi.org\/10.3390\/app13074398","journal-title":"Appl Sci"},{"key":"291_CR23","unstructured":"Jorstad ND, Smith LT Jr. Cryptographic algorithm metrics. IDA, Institute for Defense Analyses Science and Technology Division"},{"issue":"2","key":"291_CR24","doi-asserted-by":"publisher","first-page":"50","DOI":"10.17221\/12\/2015-RAE","volume":"62","author":"M Jukl","year":"2016","unstructured":"Jukl M, \u010cupera J (2016) Using of tiny encryption algorithm in CAN-Bus communication. Res Agr Eng 62(2):50\u201355. https:\/\/doi.org\/10.17221\/12\/2015-RAE","journal-title":"Res Agr Eng"},{"key":"291_CR25","doi-asserted-by":"crossref","unstructured":"Kanda M (2001) Practical security evaluation against differential and linear cryptanalysis for feistel ciphers with SPN round function, SAC 2000, LNCS 2012. Springer, pp 324\u2013338","DOI":"10.1007\/3-540-44983-3_24"},{"key":"291_CR26","unstructured":"Kumar M, Pal SK, Panigrahi A (2014) FeW: A lightweight block ciphers. Cryptology ePrint Archive, Report 2014\/326"},{"key":"291_CR27","unstructured":"Levy E, Shabtai A, Groza B, Murvay P, Elovici Y (2021) CAN-LOC: spoofing detection and physical intrusion localization on an in-vehicle CAN bus based on deep features of voltage signals. arXiv:2106.07895v1 [cs.CR] 15 Jun 2021."},{"key":"291_CR28","doi-asserted-by":"crossref","unstructured":"Lu Z, Wang Q, Chen X, Qu G, Lyu Y, Liu Z (2019) LEAP: a lightweight encryption and authentication protocol for in-vehicle communications. arXiv:1909.10380v1 [cs.CR] 23 Sep 2019.","DOI":"10.1109\/ITSC.2019.8917500"},{"key":"#cr-split#-291_CR29.1","doi-asserted-by":"crossref","unstructured":"Matsui M (1994) Linear cryptoanalysis method for DES cipher. In: Helleseth T","DOI":"10.1007\/3-540-48285-7_33"},{"key":"#cr-split#-291_CR29.2","unstructured":"(ed) EUROCRYPT 1993. LNCS, vol 765, pp 386-397. Springer"},{"key":"291_CR30","doi-asserted-by":"crossref","unstructured":"Matsui M (1994) Linear cryptanalysis method for DES cipher. Advances in cryptology: proceedings of EUROCRYPT\u201993. Springer, Berlin, pp 386\u2013397","DOI":"10.1007\/3-540-48285-7_33"},{"key":"291_CR31","doi-asserted-by":"publisher","unstructured":"Mouha N, Wang Q, Gu D, Preneel B (2011) Differential and linear cryptanalysis using mixed-integer linear programming. Information security and cryptology. Inscrypt 2011. Lecture notes in computer science, vol 7537. Springer, Berlin. https:\/\/doi.org\/10.1007\/978-3-642-34704-7_5","DOI":"10.1007\/978-3-642-34704-7_5"},{"key":"291_CR32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.2989808","author":"H Mun","year":"2020","unstructured":"Mun H, Han K, Hoon Lee D (2020) Ensuring safety and security in CAN-based automotive embedded systems: a combination of design optimization and secure communication. IEEE Trans Veh Technol. https:\/\/doi.org\/10.1109\/TVT.2020.2989808","journal-title":"IEEE Trans Veh Technol"},{"key":"291_CR33","doi-asserted-by":"publisher","unstructured":"Nyberg K (1994) Differentially uniform mappings for cryptography. In: Helleseth T (eds) Advances in Cryptology\u2014EUROCRYPT\u201993. EUROCRYPT 1993. Lecture notes in computer science, vol 765. Springer, Berlin. https:\/\/doi.org\/10.1007\/3-540-48285-7_6","DOI":"10.1007\/3-540-48285-7_6"},{"key":"291_CR34","doi-asserted-by":"publisher","unstructured":"Park CH, Kim Y, Jo J-Y (2021) A secure communication method for CANBus. 2021 IEEE 11th annual computing and communication workshop and conference (CCWC)|978-1-6654-1490-6\/21\/$31.00 \u00a92021 IEEE. https:\/\/doi.org\/10.1109\/CCWC51732.2021.9376166","DOI":"10.1109\/CCWC51732.2021.9376166"},{"key":"291_CR35","doi-asserted-by":"publisher","unstructured":"Pes\u00e9 MD, Schauer JW, Li J, Shin KG (2021) S2-CAN: sufficiently secure controller area network. In: Annual computer security applications conference (ACSAC \u201921), 6\u201310 Dec 2021, Virtual Event, USA. ACM, New York. https:\/\/doi.org\/10.1145\/3485832.3485883","DOI":"10.1145\/3485832.3485883"},{"issue":"4","key":"291_CR36","doi-asserted-by":"publisher","first-page":"325","DOI":"10.2478\/ttj-2018-0027","volume":"19","author":"J Raiynal","year":"2018","unstructured":"Raiynal J (2018) Data and cyber security in autonomous vehicle networks. Transp Telecommun 19(4):325\u2013334. https:\/\/doi.org\/10.2478\/ttj-2018-0027","journal-title":"Transp Telecommun"},{"key":"291_CR37","doi-asserted-by":"crossref","unstructured":"Rijmen V, Daemen J, Preneel B, Bosselaers A, Win ED (1996) The cipher SHARK. In: Proceeding of fast software encryption\u2014FSE 1996. Springer, pp 99\u2013111","DOI":"10.1007\/3-540-60865-6_47"},{"key":"291_CR38","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST Special Publication 800-22 Revision 1a Revised: April 2010 Lawrence E Bassham III."},{"key":"291_CR39","unstructured":"Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Special Publication 800-22 Revision 1a, April 2010."},{"key":"291_CR40","doi-asserted-by":"publisher","first-page":"7176194","DOI":"10.1155\/2022\/7176194","volume":"2022","author":"D Shi","year":"2022","unstructured":"Shi D, Kou L, Huo C, Wu T (2022) A CAN bus security testbed framework for automotive cyber-physical systems. Wirel Commun Mob Comput 2022:7176194. https:\/\/doi.org\/10.1155\/2022\/7176194","journal-title":"Wirel Commun Mob Comput"},{"key":"291_CR41","unstructured":"Siddiqui AS, Lee C-C, Che W, Plusquellic J, Saqib F, Secure intra-vehicular communication over CANFD. 978-1-5386-1421-1\/17\/$31.00\u00a92017 IEEE."},{"key":"291_CR42","unstructured":"Siddiqui AS, Gui Y, Plusquellic J, Saqib F (2017) Secure communication over CANBUS. 978-1-5090-6389-5\/17\/$31.00\u00a92017. IEEE."},{"key":"291_CR43","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1007\/s10623-014-9976-y","volume":"73","author":"H Soleimany","year":"2014","unstructured":"Soleimany H, Nyberg K (2014) Zero-correlation linear cryptanalysis of reduced-round LBlock. Des Codes Cryptogr 73:683\u2013698. https:\/\/doi.org\/10.1007\/s10623-014-9976-y","journal-title":"Des Codes Cryptogr"},{"key":"291_CR44","unstructured":"Tindel K (2020) CAN bus security-attacks on CAN bus and their mitigations. White Paper- No.1901, Ver. 07, 14 Feb 2020. CANIS Automotive Labs"},{"key":"291_CR45","doi-asserted-by":"publisher","unstructured":"Wang R, Guan Y, Li X, Zhang R (2020) Formal verification of CAN bus in cyber-physic system. In: 2020 IEEE 20th international conference on software quality, reliability and security companion (QRS-C) 978-1-7281-8915-4\/20\/$31.00 \u00a92020 IEEE. https:\/\/doi.org\/10.1109\/QRS-C51114.2020.0005","DOI":"10.1109\/QRS-C51114.2020.0005"},{"key":"291_CR46","doi-asserted-by":"publisher","unstructured":"Xiang Z, Zhang W, Bao Z, Lin D (2016) Applying MILP method to searching integral distinguishers based on division property for6 lightweight block ciphers. ASIACRYPT 2016. ASIACRYPT 2016. Lecture notes in computer science, vol 10031. Springer, Berlin https:\/\/doi.org\/10.1007\/978-3-662-53887-6_24","DOI":"10.1007\/978-3-662-53887-6_24"},{"key":"291_CR47","doi-asserted-by":"publisher","unstructured":"Xu H, Hao C, Cui Y, Qi W, Impossible differential cryptanalysis ofightweight block cipher WARP. https:\/\/doi.org\/10.21203\/rs.3.rs-3215560\/v1.","DOI":"10.21203\/rs.3.rs-3215560\/v1"},{"key":"291_CR48","doi-asserted-by":"publisher","unstructured":"Yang Q, Hu L, Shi D, Todo Y, Sun S (2018) On the complexity of impossible differential cryptanalysis. In: Hindawi security and communication networks, vol 2018, 7393401. https:\/\/doi.org\/10.1155\/2018\/7393401","DOI":"10.1155\/2018\/7393401"},{"key":"291_CR49","doi-asserted-by":"publisher","unstructured":"Yeom J, Seo S (2020) A methodology of CAN communication encryption using a shuffling algorithm. In: 2020 International conference on connected and autonomous driving (MetroCAD), 978-1-7281-6059-7\/20\/$31.00 \u00a92020 IEEE. https:\/\/doi.org\/10.1109\/MetroCAD48866.2020.00012","DOI":"10.1109\/MetroCAD48866.2020.00012"},{"issue":"4","key":"291_CR50","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1093\/comjnl\/bxw086","volume":"60","author":"W Yi","year":"2017","unstructured":"Yi W, Chen S, Li Y (2017) Zero-correlation linear cryptanalysis of SAFER block cipher family using the undisturbed bits. Comput J 60(4):613\u2013624. https:\/\/doi.org\/10.1093\/comjnl\/bxw086","journal-title":"Comput J"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00291-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-024-00291-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-024-00291-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T03:02:15Z","timestamp":1753585335000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-024-00291-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,27]]},"references-count":52,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["291"],"URL":"https:\/\/doi.org\/10.1186\/s42400-024-00291-z","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2025,7,27]]},"assertion":[{"value":"19 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"49"}}