CBEAM swMATH ID: 15633 Software Authors: Saarinen, Markku-Juhani O. Description: CBEAM: efficient authenticated encryption from feebly one-way φ functions. We show how efficient and secure cryptographic mixing functions can be constructed from low-degree rotation-invariant φ functions rather than conventional S-Boxes. These novel functions have surprising properties; many exhibit inherent feeble (Boolean circuit) one-wayness and offer speed/area tradeoffs unobtainable with traditional constructs. Recent theoretical results indicate that even if the inverse is not explicitly computed in an implementation, its degree plays a fundamental role to the security of the iterated composition. To illustrate these properties, we present CBEAM, a Cryptographic Sponge Permutation based on a single 5×1-bit Boolean function. This simple nonlinear function is used to construct a 16-bit rotation-invariant φ function of Degree 4 (but with a very complex Degree 11 inverse), which in turn is expanded into an efficient 256-bit mixing function. In addition to flexible tradeoffs in hardware we show that efficient implementation strategies exist for software platforms ranging from low-end microcontrollers to the very latest x86-64 AVX2 instruction set. A rotational bit-sliced software implementation offers not only comparable speeds to AES but also increased security against cache side channel attacks. Our construction supports sponge-based authenticated encryption, hashing, and PRF/PRNG modes and is highly useful as a compact “all-in-one” primitive for pervasive security. Homepage: http://link.springer.com/chapter/10.1007%2F978-3-319-04852-9_13 Keywords: CBEAM; authenticated encryption; cryptographic sponge functions; trapdoor \(varphi \) functions; lightweight cryptography Related Software: Keccak; Salsa20; Chaskey; XooTools; Gimli; PRINTcipher; Midori; tweakey; NOEKEON; CubeHash; ChaCha; McOE; spongent; DLMF Cited in: 3 Documents Standard Articles 1 Publication describing the Software, including 1 Publication in zbMATH Year CBEAM: efficient authenticated encryption from feebly one-way \(\varphi \) functions. Zbl 1337.94066Saarinen, Markku-Juhani O. 2014 all top 5 Cited by 7 Authors 2 Mennink, Bart 1 Jovanovic, Philipp 1 Luykx, Atul 1 Neves, Samuel 1 Saarinen, Markku-Juhani Olavi 1 Sasaki, Yu 1 Yasuda, Kan Cited in 2 Serials 1 Journal of Cryptology 1 Designs, Codes and Cryptography Cited in 1 Field 3 Information and communication theory, circuits (94-XX) Citations by Year