Academia.eduAcademia.edu

Outline

An FPGA-Based Implementation of the Pomaranch Stream Cipher

2007, Proceedings of the 3rd International ICST Conference on Mobile Multimedia Communications

Abstract

As the versatility of small, low power devices increases and their use becomes commonplace, a need for secure communications among these devices has arisen. Pomaranch is a recently developed stream cipher with two major advantages: (i) the low hardware complexity, which results in small area and (ii) the good statistical properties. This architecture supports an 80-bit key and 32-to 108-bit IV. FPGA devices were used for the performance demonstration. A maximum throughput equal to 279 Mbps can be achieved, with a clock frequency of 279 MHz.

References (14)

  1. REFERENCES
  2. Simson Garfinkel and Beth Rosenberg, RFID: Applications, Security, and Privacy. Addison-Wesley Professional, 2005.
  3. Advanced Encryption Standard, (AES) 2003 http://www.nist.gov/aes
  4. Data Encryption Standard, Federal Information Processing Standard (FIPS) 46, National Bureau of Standards, 1977.
  5. B. Schneier,, Applied Cryptography, Protocols, Algorithms, and Source Code in C. John Wiley & Sons 1994.
  6. Cees Jansen, Tor Helleseth and Alexander Kolosha, Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. eSTREAM, ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream/pomaranchp3.html
  7. eStream, ENCRYPT -European Network of Excellence in Cryptology, "Call for Stream Cipher Primitives", Scandinavian Congress Center, Aarhus, Denmark, 26-27 May 2005, http://www.ecrypt.eu.org/stream/
  8. Xilinx, San Jose, California, USA, Virtex, Field Programmable Gate Arrays, 2005, www.xilinx.com.
  9. M. D. Galanis, P. Kitsos, G. Kostopoulos, N. Sklavos, and C. E. Goutis, Comparison of the Hardware Implementation of Stream Ciphers, The International Arab Journal of Information Technology (IAJIT), Colleges of Computer and Information Society, 2005.
  10. P. Kitsos, N. Sklavos, K. Papadomanolakis and O. Koufopavlou, Hardware Implementation of Bluetooth Security, IEEE Pervasive Computing, vol. 2, no.1, pp. 21-29, January-March 2003.
  11. Kris Gaj, Gabriel Southern and Ramakrishna Bachimanchi, Comparison of hardware performance of selected Phase II eSTREAM candidates, THE STATE OF THE ART OF STREAM CIPHERS-SASC 2007, Ruhr University Bochum, Germany January 31 -February 1, 2007.
  12. Philippe Bulens, Kassem Kalach, Francois-Xavier Standaert and Jean -Jacques Quisquater, FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile, THE STATE OF THE ART OF STREAM CIPHERS-SASC 2007, Ruhr University Bochum, Germany January 31 -February 1, 2007.
  13. Paris Kitsos, On the Hardware Implementation of the MICKEY-128 Stream Cipher, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/059, 2006, http://www.ecrypt.eu.org/stream.
  14. Markus Kasper, Sandeep Kumar, Kerstin Lemke-Rust, and Christof Paar, A Compact Implementation of Edon80, eSTREAM, ECRYPT Stream Cipher Project, Report 2006/057, 2006, http://www.ecrypt.eu.org/stream.