期刊文献+

基于FPGA的eStream序列密码实现分析 被引量:1

Implementation of FPGA- based eStream Sequential Cipher
下载PDF
导出
摘要 欧洲eStream序列密码计划推动了现代序列密码的发展,序列密码研究开始关注于易于硬件实现的轻量化序列密码设计。主要研究了eStream序列密码推荐的三种面向硬件实现的密码算法:Grain-128、MICKEY2.0和TRIVIUM。首先分别介绍了三种算法的基本原理,然后针对每种算法进行FPGA下的电路结构设计,最后采用Verilog HDL语言,在Xilinx Virtex-5 FPGA平台上进行了综合实现。实现结果表明,在三种算法中,TRIVIUM算法占用FPGA逻辑资源最少,其吞吐量最高,而MICKEY2.0算法占用FPGA逻辑资源最多,同时吞吐量最低。 The project of Europe eStream sequential cipher promotes the development of modem stream cipher, and the researchers of sequential cipher turn their attention to the design of light-weight stream cipher liable to hardware implementation. Grain- 128, MICKEY2.0 and TRIVIUM, these three stream ciphers oriented to hardware implementation recommended by eStream sequential cipher the basic principles of these three stream ciphers are presented, then their circuit co are studied. Firstly, nfigurations designed on FPGA, and finally ,their comprehensive implementations are done on Xilinx Virtex-5 of FPGA platform with Verilog HDL language. Implementation result indicates that, of the three algorithms, TRIVIUM occupies the least FPGA logic resources while enjoying the highest throughput, and MICKEY2.0 occupies the highest logic resources while enjoying the lowest throughput.
出处 《通信技术》 2015年第7期850-854,共5页 Communications Technology
关键词 eStream序列密码 Grain-128 MICKEY2.0 TRIVIUM FPGA eStream sequential cipher Grain- 128 MICKEY2.0 TRIVIUM FPGA
  • 相关文献

参考文献9

二级参考文献30

  • 1张龙,吴文玲,温巧燕.流密码代数攻击的研究现状及其展望[J].通信学报,2006,27(1):91-98. 被引量:6
  • 2刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7
  • 3胡予濮.流密码的设计与分析现状[C].电子工业部.中国密码学发展报告.北京:电子工业出版社,2007:145-157. 被引量:1
  • 4MANGARD S, OSWALD E, POPP T..能量分析攻击[M].冯登国,周永彬,刘继业,等译.北京:科学出版社,2010:50-55. 被引量:8
  • 5The eSTREAM Portfolio[EB/OL]. [ 2008-04- 15 ]. http://www.ecrypt. eu. org/stream/portfolio. pdf. 被引量:1
  • 6HELL M. JOHANSSON T. MAXIMOV A.et al. A stream cipher proposal Grain- 128[R]. Seattle: IEEE International Symposium on In formation Theory. 2006:1614- 1618. 被引量:1
  • 7DINUR I, SHAMIR A. Breaking Grain-128 with dynamic cube attacks[R]. Lyngby: FSE. 2011. 被引量:1
  • 8GOOD T, BENAISSA M. Hardware results for selected stream cipher candidates[R]. Bochum: SASC. 200?. 被引量:1
  • 9AGREN M, HELL M, JOHANSSON T, et al. A new version of Grain- 128 with Authentication[R]. Lyngby: ECRYPT Workshop on Symmetric Encryption. 2011. 被引量:1
  • 10KOCHERPC,JAFFEJ,JUNB.Differential power analysis[C]//CRYPTO '99:Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology.Berlin:Springer-Verlag,1999:388-397. 被引量:1

共引文献15

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部