Abstract
A NLM generator is an alteration of LM generator with the addition of NFSR. NLM generator is high speed with low power consumption and has high security level. NLM-128, an instance from NLM family, is implemented and analyzed. This paper examines the hardware performance of NLM-128. An ALTERA FPGA Cyclone II device (EP2C35F672C8) is chosen to analyze the performance of NLM-128. The results show an output performance of 83.33Mbps with low power consumption. In addition, it is easy to be implemented in hardware because NLM-128 requires little logic gates only.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., Chichester (1996)
Wedbush Morgan Securities – Industrial Report, http://www.vikasqupta.com
Rueppel, R.A.: Correlation Immunity and the Summation Generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 260–272. Springer, Heidelberg (1986)
Meier, W., Staffelbach, O.: Correlation Properties of Combiners with Memory in Stream Ciphers. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 204–213. Springer, Heidelberg (1991)
Dawson, E.: Cryptanalysis of Summation Generator. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 209–215. Springer, Heidelberg (1993)
Golic, J., Salmasizadeh, M., Dawson, E.: Fast Correlation Attacks on the Summation Generator. Journal of Cryptology 13(2), 245–262 (2000)
Siegenthaler, T.: Design of Combiners to Prevent Divide and Conquer Attacks. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 273–279. Springer, Heidelberg (1985)
Lee, H., Moon, S.: On An Improved Summation Generator with 2-Bit Memory. Signal Processing 80(1), 211–217 (2000)
Chen, K., Dawson, E.: Security Analysis of the LM Generator. Report (2004)
Lee, H., Sung, S., Kim, H.: NLM-128, An Improved LM-type Summation Generator with 2-bit memories. In: Proceedings of 4th International Conference on Computer Sciences and Convergence Information Technology, pp. 577–582 (2009)
Altera Megafunctions, http://www.altera.com/products/ip/altera/mega.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Lee, S.Y., Lee, H. (2011). Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Communications in Computer and Information Science, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24106-2_57
Download citation
DOI: https://doi.org/10.1007/978-3-642-24106-2_57
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24105-5
Online ISBN: 978-3-642-24106-2
eBook Packages: Computer ScienceComputer Science (R0)