skip to main content
10.1145/1785481.1785569acmconferencesArticle/Chapter ViewAbstractPublication PagesglsvlsiConference Proceedingsconference-collections
poster

VLSI implementation of a non-linear feedback shift register for high-speed cryptography applications

Published: 16 May 2010 Publication History

Abstract

For secure high data-rate communications, fast key generation algorithms are crucial. In this paper, we present a VLSI implementation of a Non-Linear Feedback Shift Register (NLFSR) for cryptography applications. Unlike existing cryptographic key generation techniques, our NLFSR generates multiple (64 in our implementation) key bits in each clock cycle. This enables its use in secure, high speed communications. Our NLFSR is implemented using a plurality (3 in our implementation) of LFSRs. The outputs of 64 bits from each LFSR are combined using 64 encoded majority functions, where the majority function used for any bit is changed at every clock cycle. We demonstrate that our NLFSR can generate keys which may be used for OC-768 optical fiber communication, which operates at 40 Gbps. The keys from our NLFSR pass all the tests in the NIST suite, which is a defacto benchmark used in industry to evaluate the quality of ciphers.

References

[1]
NIST computer security resource center. http://csrc.nist.gov/groups/ST/toolkit/rng/index.html.
[2]
PTM website. http://www.eas.asu.edu/~ptm.
[3]
P. Bardell, W. McAnney, and J. Savir. Built-In Test for VLSI -- Pseudorandom Techniques. John Wiley & Sons, Inc., 1987.
[4]
W. E. Burr. Data encryption standard. http://nvl.nist.gov/pub/nistpubs/sp958-lide/250--253.pdf.
[5]
A. Canteaut. Open problems related to algebraic attacks on stream ciphers. In WCC, pages 120--134, 2005.
[6]
J. Daemen and V. Rijmen. The Design of Rijndael. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2002.
[7]
E. Dubrova, M. Teslenko, and H. Tenhunen. On analysis and synthesis of (n, k)-non-linear feedback shift registers. In DATE '08: Proceedings of the conference on Design, automation and test in Europe, pages 1286--1291, New York, NY, USA, 2008. ACM.
[8]
T. Ichikawa, T. Kasuya, and M. Matsui. Hardware evaluation of the aes finalists. In The Third Advanced Encryption Standard Candidate Conference, pages 279--285, 2000.
[9]
C. Kenny. Random number generators: An evaluation and comparison of random.org and some commonly used generators, 2005.
[10]
L. Nagel. Spice: A computer program to simulate computer circuits. In University of California, Berkeley UCB/ERL Memo M520, May 1995.
[11]
A. Poschmann, G. Le, K. Schramm, and C. Paar. A family of light--weight block ciphers based on des. In Proceedings of FSE 2007, LNCS. Springer-Verlag, 2006.
[12]
B. Schneier. Applied Cryptography. John Wiley & Sons, Inc., 1996.
[13]
J. Soto. Statistical testing of random number generators, nist, 2000.
[14]
E. Zenner. Cryptanalysis of LFSR-based pseudorandom generators- a survey, 2004.

Cited By

View all
  • (2023)Substitutes or complements? Examining effects of urban rail transit on bus ridership using longitudinal city-level dataTransportation Research Part A: Policy and Practice10.1016/j.tra.2023.103728174(103728)Online publication date: Aug-2023
  • (2023)Taking the same route every day? An empirical investigation of commuting route stability using personal electric vehicle trajectory dataTransportation10.1007/s11116-023-10377-151:4(1547-1573)Online publication date: 27-Feb-2023
  • (2013)GPU implementation of a scalable non-linear congruential generator for cryptography applicationsProceedings of the 23rd ACM international conference on Great lakes symposium on VLSI10.1145/2483028.2483068(89-94)Online publication date: 2-May-2013

Index Terms

  1. VLSI implementation of a non-linear feedback shift register for high-speed cryptography applications

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      GLSVLSI '10: Proceedings of the 20th symposium on Great lakes symposium on VLSI
      May 2010
      502 pages
      ISBN:9781450300124
      DOI:10.1145/1785481
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      • IEEE CEDA
      • IEEE CASS

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 May 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. NLFSR
      2. pseudo-random sequence
      3. stream cipher

      Qualifiers

      • Poster

      Conference

      GLSVLSI '10
      Sponsor:
      GLSVLSI '10: Great Lakes Symposium on VLSI 2010
      May 16 - 18, 2010
      Rhode Island, Providence, USA

      Acceptance Rates

      Overall Acceptance Rate 312 of 1,156 submissions, 27%

      Upcoming Conference

      GLSVLSI '25
      Great Lakes Symposium on VLSI 2025
      June 30 - July 2, 2025
      New Orleans , LA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 14 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Substitutes or complements? Examining effects of urban rail transit on bus ridership using longitudinal city-level dataTransportation Research Part A: Policy and Practice10.1016/j.tra.2023.103728174(103728)Online publication date: Aug-2023
      • (2023)Taking the same route every day? An empirical investigation of commuting route stability using personal electric vehicle trajectory dataTransportation10.1007/s11116-023-10377-151:4(1547-1573)Online publication date: 27-Feb-2023
      • (2013)GPU implementation of a scalable non-linear congruential generator for cryptography applicationsProceedings of the 23rd ACM international conference on Great lakes symposium on VLSI10.1145/2483028.2483068(89-94)Online publication date: 2-May-2013

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media