Filters








87 Hits in 2.9 sec

Hardware Framework for the Rabbit Stream Cipher [chapter]

Deian Stefan
2010 Lecture Notes in Computer Science  
Rabbit is part of the European Union's eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers.  ...  Three reconfigurable hardware designs of the Rabbit stream cipher -direct, interleaved and generalized folded structure (GFS) -are presented.  ...  Acknowledgment The author would like to thank Om Agrawal, David Nummey, and anonymous reviewers for their insightful comments and suggestions. The support of Fred L.  ... 
doi:10.1007/978-3-642-16342-5_17 fatcat:vm643x2prfc6ncyfy6jfdhgzne

A Survey on Stream Ciphers for Constrained Environments

Alaa Kadhim Farhan
2021 Zenodo  
This survey investigates a detailed flow of the stream ciphers such as algorithm design pattern, key size, internal state, throughput, the vulnerability in security, and the initial vectors for comparison  ...  The conclusion is the Fruit stream cipher has good resistance to known attacks, whereas the Enocoro128 and F-FCSR stream ciphers have large throughputs, as well as a WG, Grain, and MICKEY-128 stream ciphers  ...  Compared to block ciphers, the stream ciphers are faster and simpler in hardware.  ... 
doi:10.5281/zenodo.5732804 fatcat:5izov35nwzbrzp6nkjgftvqzpy

Light Weight Implementation of Stream Ciphers for M-Commerce Applications [article]

Mona Pourghasem, Elham Ghare Sheikhloo, Reza Ebrahimi Atani
2014 arXiv   pre-print
In today's world the use of computer and telecommunications networking is essential for human life.  ...  In order to provide security, numerous techniques have been proposed which due to the limitations of mobile devices; an algorithm should be taken that have the ability to function for light weight ubiquitous  ...  Set 2: Stream Ciphers for hardware applications with the limited resources such as memory, gate count, and low power consumption.  ... 
arXiv:1404.4791v1 fatcat:wftbxrquzzcwno3pipozw5ufle

ANALYSIS OF RC4 ENCRYPTION ALGORITHM

Elyorion Kurbonov
2019 Bulletin of the Novosibirsk Computing Center Series Computer Science  
Over the last three decades of research and development in stream ciphers, a number of designs have been proposed and analyzed by the cryptology community.  ...  The most important and cryptographically significant goal of a stream cipher is to produce a pseudorandom sequence of bits or words using a fixed length secret key, often paired with a fixed length public  ...  eSTREAM portfolio ciphers The eSTREAM project, coordinated under ECRYPT framework from 2004 to 2008, was dedicated towards stream cipher research, with an aim to "identify new stream ciphers suitable for  ... 
doi:10.31144/bncc.cs.2542-1972.2019.n43.p53-60 fatcat:qnv7twhmwnczdjevlhksgznjru

Stream ciphers and the eSTREAM project

Vincent Rijmen
2010 Isecure  
In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.  ...  A B S T R A C T Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field.  ...  Secondly, I want to thank Bart Preneel, the coordinator of ECRYPT and ECRYPT2 for providing me with supporting material.  ... 
doi:10.22042/isecure.2015.2.1.2 dblp:journals/isecure/Rijmen10 fatcat:kqanxjbr4jg5fjci7qm7jrpczy

NLM-MAC: Lightweight Secure Data Communication Framework Using Authenticated Encryption in Wireless Sensor Networks [chapter]

Pardeep Kumar, Hoon-Jae Lee
2012 Applied Cryptography and Network Security  
benchmark on stream cipher for dedicated platform and deduce the well-suited stream cipher for constraints devices.  ...  Kausar & Naureen (2009) have simulated HC-128 and Rabbit stream cipher on TinyOS and TOSSIM environment for sensor networks.  ...  It will also be useful for faculty members of graduate schools and universities.  ... 
doi:10.5772/35999 fatcat:vsgis7qp5vg4derktbqju3o2nq

Security Frameworks for Wireless Sensor Networks-Review

Gaurav Sharma, Suman Bala, Anil K. Verma
2012 Procedia Technology - Elsevier  
This paper gives an overview of cryptographic frameworks designed so far and also a comparison of existing schemes is tabled.  ...  Due to significant advances in miniaturization, low power circuit design but reasonably efficient to carry the sensitive information through wireless communication, wireless sensor network (WSN) have attracted  ...  SCUR -Tahir et al., 2008 proposed a Lightweight Encryption Mechanism based on the Rabbit stream cipher for providing confidentiality in Wireless Sensor Networks.  ... 
doi:10.1016/j.protcy.2012.10.119 fatcat:6vmzafrfabhlfa47iy35uhq4zm

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives [chapter]

Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljević
2021 Security of Ubiquitous Computing Systems  
In particular, the reason behind why modern lightweight block cipher designs have in the last decade overwhelmingly dominated stream cipher design is analyzed in terms of security against tradeoff attacks  ...  It turns out that it is possible to design stream ciphers having much smaller internal states.  ...  The requirement for unnecessarily large internal states results in extra hardware area cost which definitely hinders designing ultralightweight stream ciphers.  ... 
doi:10.1007/978-3-030-10591-4_2 fatcat:d2gtrxu225asnmubp5ezfloz3m

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
For hardware and software acceleration, basic operations are usually used in stream ciphers design.  ...  for hardware implementations.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers [chapter]

Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, Louis Wingers
2015 Lecture Notes in Computer Science  
Simon and Speck are lightweight block cipher families developed by the U.S. National Security Agency for high performance in constrained hardware and software environments.  ...  The last several years have witnessed a surge of activity in lightweight cryptographic design. Many lightweight block ciphers have been proposed, targeted mostly at hardware applications.  ...  stream ciphers must have better performance than block ciphers. 6 Interestingly, all of the stream ciphers are less efficient than the majority of the block ciphers listed.  ... 
doi:10.1007/978-3-319-16363-5_1 fatcat:eigcyfj6zjdnxhf7lyebdf7vou

Protecting Block Ciphers against Differential Fault Attacks without Re-keying (Extended Version) [article]

Anubhab Baksi, Shivam Bhasin, Jakub Breier, Mustafa Khairallah, Thomas Peyrin
2018 IACR Cryptology ePrint Archive  
Experimental results show that the throughput overheads, for incorporating our scheme into AES-128, range between ≈ 5% to ≈ 26.9% for software, and between ≈ 3.1% to ≈ 25% for hardware implementations;  ...  depending on the tweakin size.  ...  For example, as the finalists of eSTREAM project [35] , HC-128, RABBIT, SALSA20/12 and SOSEMANUK are recommended for software platforms; as these stream ciphers are well-suited for software.  ... 
dblp:journals/iacr/BaksiBBKP18 fatcat:6hxmn2tyqfcurhvz5chd4yhys4

Avalanche Effect in Improperly Initialized CAESAR Candidates

Martin Ukrop, Petr Švenda
2016 Electronic Proceedings in Theoretical Computer Science  
We argue that this is true even for the state-of-the-art designs.  ...  Analyzing 52 candidates of the current CAESAR competition has shown none of them have an avalanche effect in authentication tag strong enough to work properly when partially misconfigured.  ...  Access to computing and storage facilities owned by parties and projects contributing to the National Grid Infrastructure MetaCentrum provided under the program Projects of Projects of Large Research,  ... 
doi:10.4204/eptcs.233.7 fatcat:fxvrqtoynvdt5ejtjvbbwa4jsm

Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers

Gordon Meiser, Thomas Eisenbarth, Kerstin Lemke-Rust, Christof Paar
2008 2008 International Symposium on Industrial Embedded Systems  
First, the C code implementation provided by the ciphers' designers was ported to an 8-bit AVR microcontroller and the suitability of these stream ciphers for the use in embedded systems was assessed.  ...  For the evaluation process, we follow a two-stage approach and compare with efficient implementations of the AES block cipher.  ...  Profile I of the eSTREAM project asked for stream ciphers for software applications with high throughput requirements, while Profile II aims at identifying stream ciphers suitable for hardware applications  ... 
doi:10.1109/sies.2008.4577681 dblp:conf/sies/MeiserELP08 fatcat:srmg5kxxyjhylclnumltnbynua

Secure computing with the MPEG RVC framework

Junaid Jameel Ahmad, Shujun Li, Richard Thavot, Marco Mattavelli
2013 Signal processing. Image communication  
Recently, ISO/IEC standardized a dataflow programming framework called Reconfigurable Video Coding (RVC) for the specification of video codecs.  ...  to the conclusion that the RVC framework can successfully be applied as a general purpose framework to other fields beyond multimedia coding.  ...  Acknowledgments Junaid Jameel Ahmad was supported by the Zukunftskol leg of the University of Konstanz, Germany, which is part of the "Excellence Initiative" Program of the DFG (German Research Foundation  ... 
doi:10.1016/j.image.2013.08.015 fatcat:rn5trshixfccxnm5bjl7jxxfmu

CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm [chapter]

Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider
2012 Lecture Notes in Computer Science  
(e.g., C/C++, Java, LLVM, and Verilog/VHDL) for deployment on different platforms as software and/or hardware modules, and 3) design space exploitation such as automatic parallelization for multi-and  ...  CTL benefits from various properties of the RVC framework including tools to 1) simulate the platformindependent designs, 2) automatically generate implementations in different target programming languages  ...  -Stream Ciphers: ARC4 [60] and Rabbit [23] . -Cryptographic hash functions: SHA-1, SHA-2 (SHA-224, SHA-256) [53] . -PSNRs: 32-bit and 64-bit LCG [60] and LFSR-based PRNG [60] .  ... 
doi:10.1007/978-3-642-32946-3_22 fatcat:kr4vpjo7kjagbawpya7yhlqlwe
« Previous Showing results 1 — 15 out of 87 results