Testing Framework for eSTREAM Profile II Candidates

نویسندگان

  • L. Batina
  • S. Kumar
  • J. Lano
  • K. Lemke
  • N. Mentens
  • C. Paar
  • B. Preneel
  • K. Sakiyama
  • I. Verbauwhede
چکیده

The aim of eSTREAM Profile II is to identify a small number of stream ciphers that are suitable for low resource circuitry based implementation. Besides algorithmic properties and security evaluation to theoretical attacks, performance evaluation is another important task of eSTREAM that is being considered. In this contribution we summarize and explain our testing framework for eSTREAM Profile II candidates regarding hardware implementations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Distinguishers Based on Random Mappings against Stream Ciphers

Statistical randomness testing play an important role in analyzing the security of cryptosystems. In this study, we aim to propose a new framework of randomness testing based on the random mappings. Considering the probability distributions of coverage and ρ-lengths, we present three new distinguishers; (i) coverage test, (ii) ρ-test and (iii) DPcoverage test and applied them on Phase III Candi...

متن کامل

Comparison of hardware performance of selected Phase II eSTREAM candidates

Five leading Phase 2 Profile 2 eSTREAM candidates have been implemented in hardware, targeting two main semiconductor technologies, Field Programmable Gate Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs). An old GSM encryption algorithm A5/1 has been included in the study as well. All six ciphers have been analyzed from the point of view of the hardware efficiency, and two h...

متن کامل

FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile

Efficient cryptographic implementations are a fundamental factor in the achievement and dissemination of new computerized applications. In some recent environments with (very) limited resources such as smart cards, sensor networks or RFID tags, standard algorithms may not be completely adapted.Consequently, the design of new solutions for low-cost cryptography is sometimes necessary and is at l...

متن کامل

Hardware performance of eStream phase-III stream cipher candidates

This paper presents hardware implementation and performance metrics for the candidate stream ciphers remaining in the phase-III hardware profile. The results are presented in tabular and graphical format together with summarising the utility of the candidates against two notional applications: one for 10Mbps wireless network and a second for 100kHz RFID. An attempt has been made to quantify the...

متن کامل

Some Results on Distinguishing Attacks on Stream Ciphers

Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006