On the Parallelization of the MICKEY-128 2.0 Stream Cipher

نویسندگان

  • Deian Stefan
  • Christopher Mitchell
چکیده

The increasingly widespread use of electronic devices necessitates efficient stream ciphers providing high-throughput encryption with minimal resource usage. MICKEY-128 2.0 is a recent hardware-oriented synchronous stream cypher with a 128-bit key, proposed to the ECRYPT Stream Cipher Project. Using a novel mathematical interpretation of the algorithm, we present a method of parallelizing the stream cipher to produce an n-bit keystream output. We demonstrate a high-throughput (560 Mbps), area-efficient (392 slices) two-way parallelized implementation on the Xilinx Virtex-II Pro FPGA.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Hardware Implementations for the ISO/IEC 18033-4:2005 Standard for Stream Ciphers

In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers, MUGI and SNOW 2.0 are recently adopted by the International Organization for Standardization ISO/IEC 18033-4:2005 standard. The other two stream ciphers, MICKEY 128 and TRIVIUM have been submitted and are under consideration for the eSTREAM, the ECRYPT (European Network of Excellence for Crypto...

متن کامل

On the Hardware Implementation of the MICKEY-128 Stream Cipher

2Digital Systems and Media Computing Laboratory School of Science & Technology Hellenic Open University Patras, Greece e-mail: [email protected] ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY-128 is a recently developed stream cipher with two major advantages: (i) the low hardware complexity, which r...

متن کامل

A Differential Fault Attack on MICKEY 2.0

In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream’s hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that by injecting around 2 faults and performing 2 computa...

متن کامل

A Generic Scan Attack on Hardware based eStream Winners

Scan chains, a design for testability (DFT) feature, are included in most modern-day ICs. But, it opens a side channel for attacking cryptographic chips. We propose a methodology by which we can recover internal states of any stream cipher using scan chains without knowledge of its design. We consider conventional scan-chain design which is normally not scrambled or protected in any other way. ...

متن کامل

FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile

Efficient cryptographic implementations are a fundamental factor in the achievement and dissemination of new computerized applications. In some recent environments with (very) limited resources such as smart cards, sensor networks or RFID tags, standard algorithms may not be completely adapted.Consequently, the design of new solutions for low-cost cryptography is sometimes necessary and is at l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008