Skip to main content

Hardware Framework for the Rabbit Stream Cipher

  • Conference paper
Information Security and Cryptology (Inscrypt 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6151))

Included in the following conference series:

Abstract

Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union’s eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit’s strength against modern attacks; attacks with complexity lower than an exhaustive key search have not been found. Previous software implementations have demonstrated Rabbit’s high throughput, however, the performance in hardware has only been estimated. Three reconfigurable hardware designs of the Rabbit stream cipher – direct, interleaved and generalized folded structure (GFS) – are presented. On the Xilinx Virtex-5 LXT FPGA, a direct, resource-efficient (568 slices) implementation delivers throughputs of up to 9.16 Gbits/s, a 4-slow interleaved design reaches 25.62 Gbits/s using 1163 slices, and a 3-slow 8-GFS implementations delivers throughputs of up to 3.46 Gbits/s using only 233 slices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Cryptico A/S. Differential properties of the g-function (2003), http://www.cryptico.com/Files/filer/wp_differential_properties_gfunction.pdf

  2. Aumasson, J.P.: On a bias of Rabbit. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)

    Google Scholar 

  3. Babbage, S., Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio. In: eSTREAM, ECRYPT Stream Cipher Project (2008)

    Google Scholar 

  4. Barker, E.B., Nechvatal, M.S., Barker, E., Leigh, S., Levenson, M., Vangel, M., Discussion, G., Studies, E.: A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic Applications

    Google Scholar 

  5. Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. LNCS, pp. 1–13. Springer, Heidelberg (2000)

    Google Scholar 

  6. Boesgaard, M., Vesterager, M., Christensen, T., Zenner, E.: The Stream Cipher Rabbit. In: ECRYPT Stream Cipher Project Report 6 (2005)

    Google Scholar 

  7. Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Boesgaard, M., Vesterager, M., Zenner, E.: The Stream Cipher Rabbit. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 69–83. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  9. Bos, J.W., Casati, N., Osvik, D.A.: Multi-stream hashing on the playstation 3. In: International Workshop on State-of-the-Art in Scientific and Parallel Computing 2008, Minisymposium on Cell/B.E. Technologies (2008)

    Google Scholar 

  10. Bulens, P., Kalach, K., Standaert, F.X., Quisquater, J.J.: FPGA implementations of eSTREAM phase-2 focus candidates with hardware profile. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)

    Google Scholar 

  11. Bulens, P., Standaert, F.X., Quisquater, J.J., Pellegrin, P., Rouvroy, G.: Implementation of the AES-128 on Virtex-5 FPGAs. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 16–26. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  13. Ferro, E., Potorti, F.: Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wireless Communications 12(1), 12–26 (2005)

    Article  Google Scholar 

  14. Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)

    Google Scholar 

  15. Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, New York (2000)

    Google Scholar 

  16. Hauck, S., DeHon, A.: Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation. Morgan Kaufmann, San Francisco (2007)

    Google Scholar 

  17. Hodjat, A., Verbauwhede, I.: A 21.54 Gbits/s fully pipelined AES processor on FPGA. In: 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004, pp. 308–309 (2004)

    Google Scholar 

  18. Kitsos, P., Kostopoulos, G., Sklavos, N., Koufopavlou, O.: Hardware implementation of the RC4 stream cipher. In: Proceedings of the 46th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2003, vol. 3 (2003)

    Google Scholar 

  19. Leglise, P., Standaert, F.X., Rouvroy, G., Quisquater, J.J.: Efficient implementation of recent stream ciphers on reconfigurable hardware devices. In: 26th Symposium on Information Theory in the Benelux, pp. 261–268 (2005)

    Google Scholar 

  20. Lu, Y., Wang, H., Ling, S.: Cryptanalysis of Rabbit. In: Proceedings of the 11th International Conference on Information Security, pp. 204–214. Springer, Heidelberg (2008)

    Google Scholar 

  21. Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall Professional Technical Reference (2003)

    Google Scholar 

  22. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  23. Parhi, K.K.: VLSI Digital Signal Processing Systems: Design and Implementation. Wiley, Chichester (1999)

    Google Scholar 

  24. Schneier, B.: Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley and Sons, Chichester (1996)

    Google Scholar 

  25. Stefan, D., Mitchell, C.: Parallelized Hardware Implementation of the MICKEY-128 2.0 Stream Cipher. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)

    Google Scholar 

  26. I.A. UEA2&UIA. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2& UIA2. Document 2: SNOW 3G Specifications. Version: 1.1. ETSI/SAGE Specification (2006)

    Google Scholar 

  27. Weaver, N., Markovskiy, Y., Patel, Y., Wawrzynek, J.: Post-placement C-slow retiming for the Xilinx Virtex FPGA. In: Proceedings of the 2003 ACM/SIGDA Eleventh International Symposium on Field Programmable Gate Arrays, pp. 185–194. ACM, New York (2003)

    Chapter  Google Scholar 

  28. Wee, C.M., Sutton, P.R., Bergmann, N.W., Williams, J.A.: Multi stream cipher architecture for reconfigurable system-on-chip. In: International Conference on Field Programmable Logic and Applications, FPL 2006, pp. 1–4 (August 2006)

    Google Scholar 

  29. Xilinx. DSP Solutions Using FPGAs (2009), http://www.xilinx.com/products/design_resources/dsp_central/grouping/fpgas4dsp.htm

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Stefan, D. (2010). Hardware Framework for the Rabbit Stream Cipher. In: Bao, F., Yung, M., Lin, D., Jing, J. (eds) Information Security and Cryptology. Inscrypt 2009. Lecture Notes in Computer Science, vol 6151. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-16342-5_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-16342-5_17

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-16341-8

  • Online ISBN: 978-3-642-16342-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics