High-speed architectures for binary-tree based stream ciphers: Leviathan case study
ثبت نشده
چکیده
Abstract Real-time applications such as streaming media and voice require encryption algorithms that do not propagate errors and support fast encryption on small blocks. Since IP packets are delivered out-of-order in routed networks it is difficult to synchronize the source and the destination, therefore requiring encryption algorithms to support out-of-order generation of key stream. In this paper we investigate high-speed parallel and pipeline architectures for Leviathan, a binary tree based synchronous stream cipher that does not propagate errors and supports ordered and out-of-order key stream generation. The parallel architecture bounds the worst-case variance in the time between consecutive key words and the pipeline architecture generates key words at a uniform rate. In order to eliminate the storage overhead associated with straightforward preorder traversal, we developed a novel traversal scheme that intertwines inorder traversal with preorder traversal. We implemented pipeline architecture using Xilinx FPGAs to support 1 Gbps key stream generation rate.
منابع مشابه
Reducing Hardware Complexity of Wallace Multiplier Using High Order Compressors Based on CNTFET
Multiplier is one of the important components in many systems such as digital filters, digital processors and data encryption. Improving the speed and area of multipliers have impact on the performance of larger arithmetic circuits that are part of them. Wallace algorithm is one of the most famous architectures that uses a tree of half adders and full adders to increase the speed and red...
متن کاملA General Encryption Scheme Based on MDS Code ( Extended Summary )
Many applications, such as wireless communications, high speed multimedia data streaming systems and sensor networks, call for strong ciphers with low computation complexity and high speed in encryption and decryption. Additive stream ciphers usually have lower computation complexity and thus provide higher encryption/decryption speed than block ciphers. An additive stream cipher usually encryp...
متن کاملInvestigation of FCSR-based Pseudorandom Sequence Generators for Stream Ciphers
In this paper, feedback with carry shift registers (FCSRs) are analyzed with main focus on the general case of FCSRs with arbitrary connection integer and on maximum-period FCSRs. Moreover, a keystream generator that employs the structure of the linear feedback shift register (LFSR)-based Geffegenerator is studied in connection with FCSRs as a special nonlinear combining generator. The consider...
متن کاملStream ciphers and the eSTREAM project
Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.
متن کاملCryptanalysis of Stream Ciphers Based on Arrays and Modular Addition
In modern cryptography, stream ciphers are most useful in applications where information needs to be encrypted/decrypted at high speed (e.g. high resolution streaming video data) or when low footprint (gates/memory) encryption is required. In the literature, there exist plenty of stream ciphers whose internal states are based on arrays and that they use modular additions to generate output stre...
متن کامل