Abstract
A hardware implementation model is proposed that can be used in the design of stream ciphers, block ciphers and cryptographic hash functions. The cryptographic finite state machine (CFSM) model is no mathematical tool, but a set of criteria that have to be met by a real hardware finite state machine that will be used in the implementation of a cryptographic algorithm. Diffusion is studied by means of the diffusion graph and dependence matrix. For the study of confusion differential cryptanalysis is used.
In the paper the design of a high-speed cryptographic coprocessor is presented called Subterranean. This coprocessor can be used for both cryptographic pseudorandom sequence generation and cryptographic hashing. It can be implemented in a straightforward way as (part of) a chip. The small gate-delay allows high clockfrequencies, and even a moderate estimation of 20 MHz leads to a (stream-)encryption speed of 0.3 Gbit/s and hashing speed of 0.6 Gbit/sec.
Chapter PDF
Keywords
References
C.E. Shannon, Communication theory of secrecy systems, Bell Syst. Tech. Journal, Vol. 28, pp. 656–715, 1949.
B. Harris, Probability Distributions Related to Random Mappings, Annals of Mathematical Statistics, 31 (1959), 1045–1062.
E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystems, Journal of Cryptology (1991) 4: 3–72.
D. E. Denning, Cryptography and Data Security, Addison-Wesley, Reading, MA, 1982.
I. Damgård, Collision-Free Hash Functions and Public-Key Signature Schemes. In Advances in Cryptology-Eurocrypt '87, pp. 203–217. Lecture notes in Computer Science, vol. 304, Springer-Verlag, Berlin 1988.
J. Daemen, R. Govaerts and J. Vandewalle, A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton, Abstracts Asiacrypt '91.
J. Daemen, R. Govaerts and J. Vandewalle, On the Design of Self-Synchronizing Stream Ciphers, Proceedings ISITA '92, Singapore, Nov. 16–20 1992.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1992 Springer-Verlag
About this paper
Cite this paper
Daemen, J., Govaerts, R., Vandewalle, J. (1992). A hardware design model for cryptographic algorithms. In: Deswarte, Y., Eizenberg, G., Quisquater, JJ. (eds) Computer Security — ESORICS 92. ESORICS 1992. Lecture Notes in Computer Science, vol 648. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0013911
Download citation
DOI: https://doi.org/10.1007/BFb0013911
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-56246-7
Online ISBN: 978-3-540-47488-3
eBook Packages: Springer Book Archive