This paper provides the design of stream ciphers based on hash functions and an alternating step generator based on clock control. The keystream generators used for the design of stream ciphers uses low hardware and low power based circuits called Linear Feedback Shift Register circuits. The first two stream ciphers use toeplitz hash, CRC hash and keystream generation circuits whereas the third one uses clock controlling mechanism. Analysis is made for the generation of keystream for cloc k controlled generator (CCG). The irregular clocking in clock controlled alternating step generator provides good security against various cryptographic attacks. The parameters like periodicity, attacktime and throughput of stream ciphers are measured and compared. As per the results, the first stream cipher gives high periodicity and low attacktime, second stream cipher gives low periodicity and high attacktime. The alternating step generator provides good periodicity, high attacktime and good amount of s ecurity compared to other stream ciphers. MATLAB tool is used to calculate periodicity, attacktime and throughput whereas XILINX FPGA is used for the design and implementation purpose. Design includes synthesis, simulation, mapping, place route, verificati on, and timing analysis done for all the stream ciphers. FPGA results of stream ciphers and alternating step generator evaluate their hardware efficiencies. In all the three designs keystream generation plays a major role.
[1]
Christoph Günther,et al.
Alternating Step Generators Controlled by De Bruijn Sequences
,
1987,
EUROCRYPT.
[2]
Dieter Gollmann,et al.
Clock-controlled shift registers: a review
,
1989,
IEEE J. Sel. Areas Commun..
[3]
Angelo P. E. Rosiello.
Design of a Synchronous Stream Cipher from Hash Functions
,
2007
.
[4]
Chung-Huang Yang,et al.
Pseudorandom bit generators in stream-cipher cryptography
,
1991,
Computer.
[5]
P. P. Deepthi,et al.
Hardware Stream Cipher Based On LFSR and Modular Division Circuit
,
2008
.
[6]
Whitfield Diffie,et al.
New Directions in Cryptography
,
1976,
IEEE Trans. Inf. Theory.
[7]
P. P. Deepthi,et al.
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions
,
2009,
Comput. Secur..
[8]
P. P. Deepthi,et al.
A new hardware efficient stream cipher based on hash functions
,
2009
.
[9]
William Stallings,et al.
Cryptography and network security
,
1998
.
[10]
Thomas Beth,et al.
The Stop-and-Go Generator
,
1985,
EUROCRYPT.