Skip to main content

Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher

  • Conference paper
Convergence and Hybrid Information Technology (ICHIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 206))

Included in the following conference series:

  • 1717 Accesses

Abstract

A NLM generator is an alteration of LM generator with the addition of NFSR. NLM generator is high speed with low power consumption and has high security level. NLM-128, an instance from NLM family, is implemented and analyzed. This paper examines the hardware performance of NLM-128. An ALTERA FPGA Cyclone II device (EP2C35F672C8) is chosen to analyze the performance of NLM-128. The results show an output performance of 83.33Mbps with low power consumption. In addition, it is easy to be implemented in hardware because NLM-128 requires little logic gates only.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, Inc., Chichester (1996)

    MATH  Google Scholar 

  2. Wedbush Morgan Securities – Industrial Report, http://www.vikasqupta.com

  3. Rueppel, R.A.: Correlation Immunity and the Summation Generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 260–272. Springer, Heidelberg (1986)

    Google Scholar 

  4. Meier, W., Staffelbach, O.: Correlation Properties of Combiners with Memory in Stream Ciphers. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 204–213. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  5. Dawson, E.: Cryptanalysis of Summation Generator. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 209–215. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  6. Golic, J., Salmasizadeh, M., Dawson, E.: Fast Correlation Attacks on the Summation Generator. Journal of Cryptology 13(2), 245–262 (2000)

    Article  MathSciNet  MATH  Google Scholar 

  7. Siegenthaler, T.: Design of Combiners to Prevent Divide and Conquer Attacks. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 273–279. Springer, Heidelberg (1985)

    Google Scholar 

  8. Lee, H., Moon, S.: On An Improved Summation Generator with 2-Bit Memory. Signal Processing 80(1), 211–217 (2000)

    Article  MATH  Google Scholar 

  9. Chen, K., Dawson, E.: Security Analysis of the LM Generator. Report (2004)

    Google Scholar 

  10. Lee, H., Sung, S., Kim, H.: NLM-128, An Improved LM-type Summation Generator with 2-bit memories. In: Proceedings of 4th International Conference on Computer Sciences and Convergence Information Technology, pp. 577–582 (2009)

    Google Scholar 

  11. Altera Megafunctions, http://www.altera.com/products/ip/altera/mega.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, S.Y., Lee, H. (2011). Hardware Implementation and Performance Analysis of NLM-128 Stream Cipher. In: Lee, G., Howard, D., Ślęzak, D. (eds) Convergence and Hybrid Information Technology. ICHIT 2011. Communications in Computer and Information Science, vol 206. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24106-2_57

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24106-2_57

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24105-5

  • Online ISBN: 978-3-642-24106-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics