Hardware evaluation of eSTREAM Candidates:
نویسنده
چکیده
The results of five eSTREAM candidates using ALTERA Field Programmable Gate Arrays are presented and analyzed. Implementation costs and performance of chosen architectures are compared and disscussed. The chosen eSTREAM proposals are divided into four classes regarding the results of their implementation features.
منابع مشابه
Testing Framework for eSTREAM Profile II Candidates
The aim of eSTREAM Profile II is to identify a small number of stream ciphers that are suitable for low resource circuitry based implementation. Besides algorithmic properties and security evaluation to theoretical attacks, performance evaluation is another important task of eSTREAM that is being considered. In this contribution we summarize and explain our testing framework for eSTREAM Profile...
متن کاملRecommendations for Hardware Evaluation of Cryptographic Algorithms
At the SASC 2006 three papers on hardware implementation of the eSTREAM candidates were presented. The workshop provided an interesting platform where hardware designers were confronted with the developers of the algorithms. The presentations were followed by a lively discussion. As hardware designers, we must admit that we have learned a lot from these discussions. In this brief document we wa...
متن کاملComparison of hardware performance of selected Phase II eSTREAM candidates
Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs). An old GSM encryption algorithm A5/1 has been included in the study as well. All six ciphers have been analyzed from the point of view of the hardware efficiency, and two h...
متن کاملThree Snakes in One Hole: A 67 Gbps Flexible Hardware for SOSEMANUK with Optional Serpent and SNOW 2.0 Modes
With increasing usage of hardware accelerators in modern heterogeneous Systemon-Chips (SoCs), the distinction between hardware and software is no longer rigid. The domain of cryptography is no exception and efficient hardware design of so-called software ciphers are becoming increasingly popular. In this paper, for the first time we propose an efficient hardware accelerator design for SOSEMANUK...
متن کاملHardware performance of eStream phase-III stream cipher candidates
This paper presents hardware implementation and performance metrics for the candidate stream ciphers remaining in the phase-III hardware profile. The results are presented in tabular and graphical format together with summarising the utility of the candidates against two notional applications: one for 10Mbps wireless network and a second for 100kHz RFID. An attempt has been made to quantify the...
متن کامل