A High-Speed Hardware Implementation of the LILI-II Keystream Generator Paris Kitsos...in cooperation with Nicolas Sklavos and Odysseas Koufopavlou Digital.

Slides:



Advertisements
Similar presentations
1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Advertisements

컴퓨터구조론 교수 채수환. 교재 Computer Systems Organization & Architecture John D. Carpinelli, 2001, Addison Wesley.
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Chapter 9 Computer Design Basics. 9-2 Datapaths Reminding A digital system (or a simple computer) contains datapath unit and control unit. Datapath: A.
H.264 Intra Frame Coder System Design Özgür Taşdizen Microelectronics Program at Sabanci University 4/8/2005.
Digital Kommunikationselektroink TNE027 Lecture 6 (Cryptography) 1 Cryptography Algorithms Symmetric and Asymmetric Cryptography Algorithms Data Stream.
Session 2: Secret key cryptography – stream ciphers – part 2.
Spartan II Features  Plentiful logic and memory resources –15K to 200K system gates (up to 5,292 logic cells) –Up to 57 Kb block RAM storage  Flexible.
Institute of Applied Microelectronics and Computer Engineering © 2014 UNIVERSITY OF ROSTOCK | College of Computer Science and Electrical Engineering.
Zheming CSCE715.  A wireless sensor network (WSN) ◦ Spatially distributed sensors to monitor physical or environmental conditions, and to cooperatively.
Session 2 Symmetric ciphers 1. Stream cipher definition Recall the Vernam cipher: Plaintext Ciphertext (Running) key
Linearization of Stream Ciphers in Terms of Cellular Automata Amparo Fúster-Sabater Institute of Applied Physics (CSIC) Madrid (Spain)
Overview Logic Combinational Logic Sequential Logic Storage Devices SR Flip-Flops D Flip Flops JK Flip Flops Registers Addressing Computer Memory.
Overview Recall Combinational Logic Sequential Logic Storage Devices
Programmable logic and FPGA
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
GallagherP188/MAPLD20041 Accelerating DSP Algorithms Using FPGAs Sean Gallagher DSP Specialist Xilinx Inc.
Sequential Circuits Chapter 4 S. Dandamudi To be used with S. Dandamudi, “Fundamentals of Computer Organization and Design,” Springer,  S.
Chapter 3 Digital Logic Structures. Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 3-2 Building Functions.
ECE 3130 – Digital Electronics and Design
Códigos y Criptografía Francisco Rodríguez Henríquez A Short Introduction to Stream Ciphers.
SUPLEMENTARY CHAPTER 1: An Introduction to Digital Logic The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Unit 9 Multiplexers, Decoders, and Programmable Logic Devices
Logic Design Computer Architecture and Design Lecture 1.
Efficient FPGA Implementation of QR
System Arch 2008 (Fire Tom Wada) /10/9 Field Programmable Gate Array.
Resynchronization Attacks on WG and LEX Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.
FPGA Implementations for Volterra DFEs
FPGA (Field Programmable Gate Array): CLBs, Slices, and LUTs Each configurable logic block (CLB) in Spartan-6 FPGAs consists of two slices, arranged side-by-side.
Cryptanalysis of the Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.
Digital Logic Problems (II) Prof. Sin-Min Lee Department of Mathematics and Computer Science.
Session 1 Stream ciphers 1.
ECE 553: TESTING AND TESTABLE DESIGN OF DIGITAL SYSTEMS
More Digital circuits. Ripple Counter The most common counter The problem is that, because more than one output is changing at once, the signal is glichy.
 Counters are sequential circuits which "count" through a specific state sequence. They can count up, count down, or count through other fixed sequences.
TOPIC : Signature Analysis. Introduction Signature analysis is a compression technique based on the concept of (CRC) Cyclic Redundancy Checking It realized.
Implementing and Optimizing a Direct Digital Frequency Synthesizer on FPGA Jung Seob LEE Xiangning YANG.
Computer Architecture and Organization Unit -1. Digital Logic Circuits – Logic Gates – Boolean Algebra – Map Simplification – Combinational Circuits –
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
RTL Design Methodology Transition from Pseudocode & Interface
ESS | FPGA for Dummies | | Maurizio Donna FPGA for Dummies Basic FPGA architecture.
COUNTERS Why do we need counters?
Secured Hash Function Efficient hardware implementation by Liron Cohen Based on “LFSR-based Hashing and Authentication” by Hugo Krawvzyk (IBM)
2/19/2016http://csg.csail.mit.edu/6.375L11-01 FPGAs K. Elliott Fleming Computer Science & Artificial Intelligence Lab Massachusetts Institute of Technology.
Digital Logic Design Basics Combinational Circuits Sequential Circuits Pu-Jen Cheng Adapted from the slides prepared by S. Dandamudi for the book, Fundamentals.
An Overview of Parallel Processing
Fast VLSI Implementation of Sorting Algorithm for Standard Median Filters Hyeong-Seok Yu SungKyunKwan Univ. Dept. of ECE, Vada Lab.
EEL 5722 FPGA Design Fall 2003 Digit-Serial DSP Functions Part I.
RTL Hardware Design by P. Chu Chapter 9 – ECE420 (CSUN) Mirzaei 1 Sequential Circuit Design: Practice Shahnam Mirzaei, PhD Spring 2016 California State.
Introduction to Computer Science Robert Sedgewick and Kevin Wayne Copyright © Recap: Combinational Circuits Please.
1 Modeling Synchronous Logic Circuits Debdeep Mukhopadhyay Associate Professor Dept of Computer Science and Engineering NYU Shanghai and IIT Kharagpur.
หัวข้อบรรยาย Stream cipher RC4 WEP (in)security LFSR CSS (in)security.
Design and Analysis of Low-Power novel implementation of encryption standard algorithm by hybrid method using SHA3 and parallel AES.
ECE 3130 Digital Electronics and Design
Improved Resource Sharing for FPGA DSP Blocks
Instructor: Dr. Phillip Jones
Chapter One Introduction to Pipelined Processors
Field Programmable Gate Array
Field Programmable Gate Array
Field Programmable Gate Array
Erasable Programmable Logic Devices (EPLDs)
Lesson 4 Synchronous Design Architectures: Data Path and High-level Synthesis (part two) Sept EE37E Adv. Digital Electronics.
Overview Part 1 - Registers, Microoperations and Implementations
Electronics for Physicists
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
Instruction execution and ALU
Information and Computer Security CPIS 312 Lab 4 & 5
Programmable logic and FPGA
Presentation transcript:

A High-Speed Hardware Implementation of the LILI-II Keystream Generator Paris Kitsos...in cooperation with Nicolas Sklavos and Odysseas Koufopavlou Digital Systems and Media Computing Laboratory School of Science & Technology Hellenic Open University, Patras, Greece

Presentation Overview LILI-II specifications overview Proposed hardware architecture VLSI implementation results Comparisons in terms of FPGA area, clock frequency and performance with existing works

LILI-II Specifications (I) LILI- ΙΙ generator is a clock-controlled nonlinear filter generator LILI-II –Use two binary LFSRs and –Two functions in order to generate a pseudorandom binary keystream sequence The components of LILI-II grouped into two subsystems, based on the functions they perform –Clock control and Data generator

LILI-II Specifications (II) The LFSR for the clock-control subsystem is regularly clocked The output of the Clock-Control LFSR control the Data-Generation LFSR

LILI-II Specifications (III) Clock-control LFSR (LFSRc) –Use a primitive polynomial with length equal to 128 The function fc defined as Data Generation LFSR (LFSRd) –Use a primitive polynomial with length equal to 127 The Boolean function fd has 12 inputs for the LFSRd stages and defined by a truth table

Proposed Architecture (I) The proposed architecture consists of the clock- control subsystem and the data generation subsystem Operation –Initialization phase –Keystream generation phase Initialization Phase –Use the secret key and initialization vector and operates twice and the output feeds the LFSRs as new values Keystream generator Phase –When the initialization phase finish the generator produce the appropriate keystream bits.

Proposed Architecture (II)

Proposed Architecture (III) The Clock-Control subsystem is comprised by the LFSRc, the function fc and the Clock Pulses components. The fc is a simple 3-bit adder. The Clock Pulses control the LFSR d s through the AND gates.

Proposed Architecture (IV) The Data-Generation subsystem is comprised by 4 LFSR d s, 4 AND gates, the function fd, 6 Pipeline Registers and 12 4x1 Multiplexers. Pipeline registers are located in the LFSR d (i) outputs in order to equalise the data delays between of them The multiplexers (MUXs) are used in order to combine the appropriate LFSR d s positions The fd function is implemented by ROM with 4096 per 1-bit elements

A Different Approach Many applications, in the same device, demand different security levels. This could be achieved with the usage of reconfigurable LFSRs, if different feedback polynomials selected any time.

VLSI Implementation Results DeviceVIRTEX 2V1000FF896 ResourcesUsedAvail.Utilization I/Os % Function Generations % CLB Slices % Dffs or Latches % Block RAM %

Comparisons Stream Cipher FPGA DeviceF (MHz) Bit rate (Mbps) LILI-II (previous) 2V6000FF A5/1 2V250FG E0 2V250FG25189 Edon80 2V250FG WG ASIC Proposed V400BG Proposed V400EBG Proposed 2V1000FF896366

Conclusions An efficient hardware implementations of the LILI-II keystream generator was presented Achieves a throughput equal to 366 Mbps The proposed architecture is more hardware efficient than previous works

Questions ?