Main Article Content

Abstract

The PRESENT block cipher is commonly used in constrained devices, such as IoT nodes, low-power wireless sensors, and RFID tags, due to its low power consumption, small hardware footprint, and acceptable security margin. However, PRESENT’s substitution layer depends on a fixed S-box, which can reduce resistance against specific analytical attacks (linear and differential analysis). In the proposed version, the static S-box is replaced with a dynamic, key-dependent S-box created by rounds of a lightweight Feistel network. The modified variant eliminates repetitive patterns in the substitution layer. In this study, we evaluate the security strength of the proposed method using differential analysis, linear analysis, avalanche rate, algebraic interpolation attacks, and integral/square attacks. Additionally, we measure the time and hardware complexity. The results demonstrate that the introduced version achieves an average avalanche value of 30.92 flipped bits with a standard deviation of 4.7, indicating strong diffusion with increased variability compared to PRESENT, while maintaining moderate computational and hardware complexity. The improved security of the introduced scheme is attained at the expense of a modest increase in hardware area, consistent with current lightweight cipher design trade-offs.

Keywords

Feistel Avalanche Complexity Security

Article Details

How to Cite
Salloom, G., Mohammed, K. ., Hameed, S., & Abdul Majed, K. . (2026). A Feistel-based modification of the PRESENT lightweight block cipher. Future Technology, 5(2), 60–68. Retrieved from https://fupubco.com/futech/article/view/684
Bookmark and Share

References

  1. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. Robshaw, Y. Seurin and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher,” in Cryptographic Hardware and Embedded Systems (CHES), Vienna, Austria, , 2007. https://doi.org/10.1007/978-3-540-74735-2_31
  2. A. Abdelli, W. E. h. Youssef, F. Kharroubi, L. Khriji and M. Machhout, “A novel enhanced chaos based present lightweight cipher scheme,” Electrical and Computer Engineering, vol. 99, no. 1, 2024. https://doi.org/10.1088/1402-4896/ad1560
  3. A. S. Salim and S. I. F. Taha, “Improving PRESENT Lightweight Algorithm,” 2013. https://doi.org/10.5120/12931-9874
  4. R. Bharathi and N. Parvatham, “Light-Weight Present Block Cipher Model for IoT Security on FPGA.,” Intelligent Automation & Soft Computing , vol. 33, no. 1, pp. 1079-8587, 2022. https://doi.org/10.32604/iasc.2022.022067
  5. N. Maatallah, H. Mestiri, A. A. Mohamed and M. Machhout, “Enhancing IoT Security for Sustainable Development: A Parity Checking Approach for Fault Detection in PRESENT Block Cipher,” Engineering, Technology & Applied Science Research, vol. 15, no. 2, pp. 1982-21988, 2025. https://doi.org/10.48084/etasr.10109
  6. H. K. H. Zaid M. Jawad Kubba, “Modified PRESENT Encryption algorithm based on new 5D Chaotic system,” IOP Conference Series:, 2020. https://doi.org/10.1088/1757-899X/928/3/032023
  7. R. D. Labio and E. D. Festijo, “D-PRESENT: A Lightweight Block Cipher with Dynamic Key-Dependent Substitution Boxes,” International Conference on Advanced Computer Science and Information Systems (ICACSIS), 2020. https://doi.org/10.1109/ICACSIS51025.2020.9263158
  8. M. Lewandowski and S. Katkoori, “Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks,” Computer Society Annual Symposium on VLSI (ISVLSI), 2021. https://doi.org/10.1109/ISVLSI51109.2021.00063
  9. Zhang and Wentao, “RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms,” Science China Information Sciences, vol. 58, no. 12 , pp. 1-15, 2015. https://doi.org/10.1007/s11432-015-5459-7
  10. M. Wang, Y. Wang and H. Wu, “Cryptanalysis of the PRESENT Block Cipher,” in International Conference on Cryptology , Casablanca, Morocco, 2008. https://doi.org/10.1007/978-3-540-89754-5_14
  11. J. Y. Cho, “Linear cryptanalysis of reduced-round PRESEN,” in Information Security and Cryptology (ICISC), Seoul, South Korea, 2009. https://doi.org/10.1007/978-3-642-14423-3_16
  12. A. Lindman, “Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network,” Cryptology ePrint Archive, 2025. https://eprint.iacr.org/2025/001
  13. Y. e. a. Li, “A Novel Feistel-Based Low-Latency Block Cipher for IoT Applications,” IEEE Internet of Things Journal , 2025. https://doi.org/10.1109/JIOT.2025.3600289
  14. M. Alawida, “Tree-Feistel Cipher Standard for IoT Communication System,” IEEE Internet of Things Journal, 2025. https://doi.org/10.1109/JIOT.2025.3520123
  15. Al-Nofaie, S. Meteb, S. Sharaf and a. R. Molla, “Design trends and comparative analysis of lightweight block ciphers for IoTs,” Applied Sciences , vol. 7740, 2025. https://doi.org/10.3390/app15147740
  16. A. Bogdanov, G. Leander, K. Nyberg and and M. Wang, “On the construction of S-boxes using Feistel structures,” in Workshop on Cryptographic Hardware and Embedded Systems (CHES), 214. https://doi.org/10.1007/978-3-662-44709-3_2
  17. S. Kutzner, G. Leander and a. A. Poschmann, “Construction of lightweight S-boxes using Feistel and MISTY structures,” in Selected Areas in Cryptography (SAC), 2015. https://doi.org/10.1007/978-3-319-31301-6_11
  18. K. Mohajerani, R. Haeussler, R. Nagpal, F. Farahmand, A. Abdulgadir, J.-P. Kaps and K. Gaj, “FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results,” Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps and Kris Gaj, 2020. https://eprint.iacr.org/2020/1207
  19. J. P. Bhoge and P. N. Chatur, “Avalanche Effect of AES Algorithm,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3101-3103, 2014. http://ijcsit.com/docs/Volume%205/vol5issue03/ijcsit20140503117.pdf
  20. D. Upadhyay, N. Gaikwad, M. Zaman and S. Sampalli, “Investigating the Avalanche effect of Various Cryptographically Secure Hash Functions and Hash-based Applications,” vol. 10, pp. 112472 - 112486, 2022. https://doi.org/10.1016/j.measen.2022.100569
  21. NIST/SEMATECH, “Engineering Statistical Handbook,” 2012. [Online]. Available: https://www.itl.nist.gov/div898/handbook/.
  22. M. I. Mihailescu and S. L. Nita, Pro Cryptography and Cryptanalysis, Bucharest, Romania: Springer, 2021, p. 483–499. https://doi.org/10.1007/978-1-4842-6367-9
  23. S. Wu and M. Wang, “Integral Attacks on Reduced-Round PRESENT,” in Information and Communications Security, 2013. https://doi.org/10.1007/978-3-319-02726-5_12