Design and Implementation of IP Core for RoadRunneR-128 Block Cipher

被引:0
作者
Raj, Mitha [1 ]
Joseph, Shinta K. [1 ]
Tomy, Josemon [1 ]
Niveditha, K. S. [1 ]
Johnson, Anna [1 ]
Nandakumar, R. [2 ]
Raj, Mitu [3 ]
机构
[1] Jyothi Engn Coll, Dept Elect & Commun, Trichur, India
[2] Natl Inst Elect & Informat Technol NIELIT, Calicut, Kerala, India
[3] Ctr Dev Adv Comp, Trivandrum, Kerala, India
来源
2017 INTERNATIONAL CONFERENCE ON PUBLIC KEY INFRASTRUCTURE AND ITS APPLICATIONS (PKIA 2017) | 2017年
关键词
Bitslice cipher; Block ciphers; FPGA; IP core; Lightweight cryptography; RoadRunneR-128;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
RoadRunneR-128 is a recently invented light weight, Feistel-type bit slice block cipher with a block size of 64 bits and key length of 128 bits. RoadRunneR is specifically designed to offer a better performance in resource constrained 8-bit platforms. This cipher is highly optimised for implementation on 8-bit CPUs with proven security against linear and differential attacks. The paper deals with design and hardware implementation of a soft IP core for RoadRunneR-128 on FPGA. The paper then discusses the performance, resource utilization and estimated power consumption of the design on ALTERA DE1 cyclone II FPGA. It is inferred that the implemented design of RoadRunneR-128 is well suited for light weight platforms, and performs at a maximum clock frequency of 272.18 MHz, throughput of 65 Mbps, and an efficiency of 0.081 Mbps/slice. The work presented here, evidently outperforms its previous hardware implementations, since the invention of the cipher in 2015. The implemented cipher is found to be lighter, and the performance and the security are comparable with its competitors like AES, PRIDE and SPECK.
引用
收藏
页码:57 / 62
页数:6
相关论文
共 15 条
[1]  
ALBRECHT MR, 2014, PROC CRYPTO 2014 34, V8616, P57
[2]  
[Anonymous], 2014, PROC IACR
[3]   Establishment of Light Weight Cryptography for Resource Constraint Environment using FPGA [J].
Baskar, Chanthini ;
Balasubramaniyan, C. ;
Manivannan, D. .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :165-171
[4]  
Baysal Adnan, 2015, LIGHTSEC 2015 BOCH G
[5]  
Blondeau Celine, 2014, P 33 ANN INT C THEOR, P165
[6]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[7]  
Daemen J., 2000, Nessie Proposal: NOEKEON
[8]  
Del Rosal Edni., 2017, Journal of Circuits and Systems, V8, P237, DOI [DOI 10.4236/CS.2017.89016, 10.4236/cs.2017.89016]
[9]  
Ferrandi F, 2007, IC-SAMOS: 2007 INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTER SYSTEMS: ARCHITECTURES, MODELING AND SIMULATION, PROCEEDINGS, P145, DOI 10.1109/ICSAMOS.2007.4285745
[10]  
Fouque Pierre-Alain, 2013, Cryptography and Coding. 14th IMA International Conference, IMACC 2013. Proceedings: LNCS 8308, P252, DOI 10.1007/978-3-642-45239-0_15