On the Parallelization of the MICKEY-128 2.0 Stream Cipher
نویسندگان
چکیده
The increasingly widespread use of electronic devices necessitates efficient stream ciphers providing high-throughput encryption with minimal resource usage. MICKEY-128 2.0 is a recent hardware-oriented synchronous stream cypher with a 128-bit key, proposed to the ECRYPT Stream Cipher Project. Using a novel mathematical interpretation of the algorithm, we present a method of parallelizing the stream cipher to produce an n-bit keystream output. We demonstrate a high-throughput (560 Mbps), area-efficient (392 slices) two-way parallelized implementation on the Xilinx Virtex-II Pro FPGA.
منابع مشابه
Hardware Implementations for the ISO/IEC 18033-4:2005 Standard for Stream Ciphers
In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers, MUGI and SNOW 2.0 are recently adopted by the International Organization for Standardization ISO/IEC 18033-4:2005 standard. The other two stream ciphers, MICKEY 128 and TRIVIUM have been submitted and are under consideration for the eSTREAM, the ECRYPT (European Network of Excellence for Crypto...
متن کاملOn the Hardware Implementation of the MICKEY-128 Stream Cipher
2Digital Systems and Media Computing Laboratory School of Science & Technology Hellenic Open University Patras, Greece e-mail: [email protected] ABSTRACT Encryption algorithms are becoming more necessary to ensure the securely transmitted data over insecure communication channels. MICKEY-128 is a recently developed stream cipher with two major advantages: (i) the low hardware complexity, which r...
متن کاملA Differential Fault Attack on MICKEY 2.0
In this paper we present a differential fault attack on the stream cipher MICKEY 2.0 which is in eStream’s hardware portfolio. While fault attacks have already been reported against the other two eStream hardware candidates Trivium and Grain, no such analysis is known for MICKEY. Using the standard assumptions for fault attacks, we show that by injecting around 2 faults and performing 2 computa...
متن کاملA Generic Scan Attack on Hardware based eStream Winners
Scan chains, a design for testability (DFT) feature, are included in most modern-day ICs. But, it opens a side channel for attacking cryptographic chips. We propose a methodology by which we can recover internal states of any stream cipher using scan chains without knowledge of its design. We consider conventional scan-chain design which is normally not scrambled or protected in any other way. ...
متن کاملFPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile
Efficient cryptographic implementations are a fundamental factor in the achievement and dissemination of new computerized applications. In some recent environments with (very) limited resources such as smart cards, sensor networks or RFID tags, standard algorithms may not be completely adapted.Consequently, the design of new solutions for low-cost cryptography is sometimes necessary and is at l...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008