2010 13th Euromicro Conference on Digital System Design: Architectures, Methods and Tools 2010
DOI: 10.1109/dsd.2010.49
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Hardware Implementation of the Grain Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
3
2

Relationship

2
7

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Grain-80, like other FSR-based stream ciphers, has characteristics that make it ideal for the transformation suggested in this paper: it targets mostly highly-constrained environments with tight power budget; due to its simple structure and lack of complex combinational functions, the cipher has short critical paths (it can work at 1.9 Ghz in TSMC 90 nm technology when synthesized for best performance [22]) and is normally used in low-frequency systems (f O << f M /2). Also, Grain-80 has been the target of successful power analysis attacks [9], [15]- [17], which makes power analysis countermeasures necessary.…”
Section: B Transformation Of the Grain Ciphermentioning
confidence: 99%
“…Grain-80, like other FSR-based stream ciphers, has characteristics that make it ideal for the transformation suggested in this paper: it targets mostly highly-constrained environments with tight power budget; due to its simple structure and lack of complex combinational functions, the cipher has short critical paths (it can work at 1.9 Ghz in TSMC 90 nm technology when synthesized for best performance [22]) and is normally used in low-frequency systems (f O << f M /2). Also, Grain-80 has been the target of successful power analysis attacks [9], [15]- [17], which makes power analysis countermeasures necessary.…”
Section: B Transformation Of the Grain Ciphermentioning
confidence: 99%
“…Our work can be used to complement the architectural approaches. For example, in [30] the FSR equivalence transformation [31] is applied to Grain-80 resulting in 50% delay improvement. The presented approach can be used on top of this transformation [31] to further reduce the area and power of Grain-80.…”
Section: Related Workmentioning
confidence: 99%
“…The grain-128 supports the 128-bit key and an IV of 96 bits. This encryption is still very small and easy to be implemented in hardware [22]. In addition, the speed in hardware implementation can be easily increased.…”
Section: Random Number Generator (Rng)mentioning
confidence: 99%
“…The appropriate algorithm in our case is grain-128, because it supports the 128-bit key, and its initial vector is about 96 bits. This encryption is very small and easy to implement in hardware [22]. In addition, it is possible and easy to speed up the hardware design.…”
mentioning
confidence: 99%