Comparison of hardware performance of selected Phase II eSTREAM candidates
نویسندگان
چکیده
Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs). An old GSM encryption algorithm A5/1 has been included in the study as well. All six ciphers have been analyzed from the point of view of the hardware efficiency, and two hardware architectures have been developed for each of them. The first of these architectures has been optimized for the minimum area, and the second for the maximum throughput to area ratio. Our study has revealed very large differences among all eSTREAM candidates in terms of the hardware efficiency, and have demonstrated a relative superiority of Trivium and Grain over other analyzed ciphers.
منابع مشابه
Testing Framework for eSTREAM Profile II Candidates
The aim of eSTREAM Profile II is to identify a small number of stream ciphers that are suitable for low resource circuitry based implementation. Besides algorithmic properties and security evaluation to theoretical attacks, performance evaluation is another important task of eSTREAM that is being considered. In this contribution we summarize and explain our testing framework for eSTREAM Profile...
متن کاملFPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile
Efficient cryptographic implementations are a fundamental factor in the achievement and dissemination of new computerized applications. In some recent environments with (very) limited resources such as smart cards, sensor networks or RFID tags, standard algorithms may not be completely adapted.Consequently, the design of new solutions for low-cost cryptography is sometimes necessary and is at l...
متن کاملHardware performance of eStream phase-III stream cipher candidates
This paper presents hardware implementation and performance metrics for the candidate stream ciphers remaining in the phase-III hardware profile. The results are presented in tabular and graphical format together with summarising the utility of the candidates against two notional applications: one for 10Mbps wireless network and a second for 100kHz RFID. An attempt has been made to quantify the...
متن کاملHardware evaluation of eSTREAM Candidates:
The results of five eSTREAM candidates using ALTERA Field Programmable Gate Arrays are presented and analyzed. Implementation costs and performance of chosen architectures are compared and disscussed. The chosen eSTREAM proposals are divided into four classes regarding the results of their implementation features.
متن کاملUnderstanding the ZK-Crypts ─ Ciphers for (Almost) all Reasons
The ZK-Crypt combination compact hardware stream cipher engines each include a true random number generator, a stream cipher and a data authenticator based on a fast compact engine and proven "noise sources". The ZK-Crypt II 7.0 K gate and ZK-Crypt 8.2 K gate "engines" output a 32 bit word at each clock cycle with 128 and 160-bit keys, maximizing throughput with very low energy per enciphered b...
متن کامل