Design Space Exploration of Galois and Fibonacci Configuration Based on Espresso Stream Cipher

被引:1
|
作者
Shi, Zhengyuan [1 ]
Chen, Cheng [1 ]
Yang, Gangqiang [1 ]
Xiong, Hailiang [1 ]
Li, Fudong [2 ]
Hu, Honggang [3 ]
Wan, Zhiguo [4 ]
机构
[1] Shandong Univ, 72 Binhai St, Qingdao 266237, Shandong, Peoples R China
[2] Univ Alberta, Edmonton, AB T6GIH9, Canada
[3] Univ Sci & Technol China, 96 Jinzhai St, Hefei, Anhui, Peoples R China
[4] Zhejiang Lab, Zhongtai St, Hangzhou 78229, Zhejiang, Peoples R China
基金
中国国家自然科学基金;
关键词
Lightweight cryptography; Espresso; FPGA optimization; stream cipher; Galois NFSR; Fibonacci NFSR; FAMILY;
D O I
10.1145/3567428
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fibonacci and Galois are two different kinds of configurations in stream ciphers. Although many transformations between two configurations have been proposed, there is no sufficient analysis of their FPGA performance. Espresso stream cipher provides an ideal sample to explore such a problem. The 128-bit secret key Espresso is designed in Galois configuration, and there is a Fibonacci-configured Espresso variant proved with the equivalent security level. To fully leverage the efficiency of two configurations, we explore the hardware optimization approaches toward area and throughput, respectively. In short, the FPGA-implemented Fibonacci cipher is more suitable for extremely resource-constrained or high-throughput applications, while the Galois cipher compromises both area and speed. To the best of our knowledge, this is the first work to systematically compare the FPGA performance of cipher configurations under relatively fair cryptographic security. We hope this work can serve as a reference for the cryptography hardware architecture research community.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Design space exploration with a stream compiler
    Mencer, O
    Pearce, DJ
    Howes, LW
    Luk, W
    2003 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2003, : 270 - 277
  • [2] A Stream Cipher Design Based on Embedding of Random Bits
    Mihaljevic, Miodrag J.
    Imai, Hidenki
    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 1496 - +
  • [3] Design of Embedded Ethernet Interface Based on Chaotic Stream Cipher
    Key Laboratory of Electronic Engineering College of Heilongjiang Province Heilongjiang University, Harbin, China
    J. Inf. Hiding Multimedia Signal Proces., 3 (409-415):
  • [4] A design of stream cipher based on multi-chaotic functions
    Klomkam, K
    Jansri, A
    Sooraksa, P
    IEEE INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES 2004 (ISCIT 2004), PROCEEDINGS, VOLS 1 AND 2: SMART INFO-MEDIA SYSTEMS, 2004, : 931 - 935
  • [5] deepSPACE: Generative AI for Configuration Design Space Exploration
    Botero, Emilio M.
    Smart, Jordan T.
    AIAA AVIATION FORUM AND ASCEND 2024, 2024,
  • [6] A Novel Biometric Fingerprint Template Based Method for Stream Cipher Design
    Ahmad, Musheer
    Alam, Bashir
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 2, 2015, 340 : 419 - 427
  • [7] Stream cipher design based on inter-perturbations of chaotic systems
    Xiang Fei
    Qiu Shui-Sheng
    ACTA PHYSICA SINICA, 2008, 57 (10) : 6132 - 6138
  • [8] Design and Implementation on FPGA Board of a Chaos-based Stream Cipher
    Dridi, Fethi
    El Assad, Safwan
    Atamech, Carinelle
    Youssef, Wajih Elhadj
    Machhout, Mohsen
    INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 37 - 41
  • [9] Design and Implementation of Dynamic Key Based Stream Cipher for Cryptographic Processor
    Pandian, K. K. Soundra
    Pal, Saptadeep
    Chandra, Kailash
    2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [10] Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers
    Koike, Yuji
    Sakamoto, Kosei
    Hayashi, Takuya
    Isobe, Takanori
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 142 - 159