2007
DOI: 10.1504/ijwmc.2007.013798
|View full text |Cite
|
Sign up to set email alerts
|

Grain: a stream cipher for constrained environments

Abstract: Abstract. A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on two shift registers and a nonlinear output function. The cipher has the additional feature that the speed can be increased at the expense of extra hardware. The key size is 80 bits and no attack faster than exhaustive key search has been identified. The hardware complexity and throughput compares favourably to other hardware oriented stream c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
264
0
4

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 364 publications
(268 citation statements)
references
References 9 publications
0
264
0
4
Order By: Relevance
“…The starting point for the construction of our mutual authentication protocol is a stream cipher such as Grain or Trivium [25,16], that takes a secret key and a non-secret initialization value (IV) as input and produces a binary sequence (the keystream). An IVdependent stream cipher of key length k bits and IV length n bits that produces a keystream sequence of length up to m bits can be conveniently represented as a family of functions F = {f K } : {0, 1} n → {0, 1} m indexed by a key K randomly chosen from {0, 1} k ; f K thus represents the function mapping the IV to the keystream associated with key K. For such an IV-dependent stream cipher to be considered secure when producing keystreams of length at most m bits, one usually requires [9] that the associated family of functions F be a pseudo-random function (PRF).…”
Section: Definitions and Propertiesmentioning
confidence: 99%
See 1 more Smart Citation
“…The starting point for the construction of our mutual authentication protocol is a stream cipher such as Grain or Trivium [25,16], that takes a secret key and a non-secret initialization value (IV) as input and produces a binary sequence (the keystream). An IVdependent stream cipher of key length k bits and IV length n bits that produces a keystream sequence of length up to m bits can be conveniently represented as a family of functions F = {f K } : {0, 1} n → {0, 1} m indexed by a key K randomly chosen from {0, 1} k ; f K thus represents the function mapping the IV to the keystream associated with key K. For such an IV-dependent stream cipher to be considered secure when producing keystreams of length at most m bits, one usually requires [9] that the associated family of functions F be a pseudo-random function (PRF).…”
Section: Definitions and Propertiesmentioning
confidence: 99%
“…Some stream ciphers with a very low hardware footprint, e.g. Grain v1 or Trivium [25,16], are also known to have the potential to lead to extremely efficient authentication solutions. On the other hand, few explicit stream cipher based authentication schemes have been proposed so far; an example is the relatively complex stream cipher based protocol from [36] which requires up to six message exchanges.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, a regular stream cipher is sufficient for WIPR-RNS. We may choose Grain [8] as the selected stream cipher. Grain uses about 1300 gates and may be the most efficient stream cipher without known flaws.…”
Section: B Wipr-rnsmentioning
confidence: 99%
“…Grain-128a is essentially part of the Grain family which was first proposed by Hell, Johansson and Meier in 2005 [13] as a part of the eStream project. The physical structure of the Grain family is simple as well as elegant and has been designed so as to require low hardware complexity.…”
Section: Introductionmentioning
confidence: 99%