skip to main content
research-article

Hardware Optimizations of Fruit-80 Stream Cipher: Smaller than Grain

Published:11 March 2023Publication History
Skip Abstract Section

Abstract

Fruit-80, which emerged as an ultra-lightweight stream cipher with 80-bit secret key, is oriented toward resource-constrained devices in the Internet of Things. In this article, we propose area and speed optimization architectures of Fruit-80 on FPGAs. Our implementations include both serial and parallel structure and optimize area, power, speed, and throughput, respectively. The area optimization architecture aims to achieve the most suitable ratio of look-up-tables and flip-flops to fully utilize the reconfigurable unit. It also reuses NFSR and LFSR feedback functions to save resources for high throughput. The speed optimization architecture adopts a hybrid approach for parallelization and reduces the latency of long data paths by pre-generating primary feedback and inserting flip-flops. Besides, we recommend using the round key function to optimize serial or parallel implementations for Fruit-80 and using indexing and shifting methods for different throughput. In conclusion, our results show that the area optimization architecture occupies up to 35 slices on Xilinx Spartan-3 FPGA and 18 slices on Xilinx 7 series FPGA, smaller than that of Grain and other common stream ciphers. The optimal throughput/area ratio of the speed optimization architecture is 7.74 Mbps/slice, better than that of Grain v1, which is 5.98 Mbps/slice. The serial implementation of Fruit-80 with round key function occupies only 75 slices on Spartan-3 FPGA. To the best of our knowledge, the result sets a new record of the minimum area in lightweight cipher implementation on FPGA.

REFERENCES

  1. [1] Ukil Arijit, Bandyopadhyay Soma, and Pal Arpan. 2014. IoT-privacy: To be private or not to be private. In Proceedings of the 2014 IEEE INFOCOM Workshops (Toronto, ON, Canada, April 27 - May 2). IEEE, 123124.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Daemen Joan and Rijmen Vincent. 2002. The Design of Rijndael: AES - The Advanced Encryption Standard. Springer. Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Bogdanov Andrey, Knudsen Lars R., Leander Gregor, Paar Christof, Poschmann Axel, Robshaw Matthew J. B., Seurin Yannick, and Vikkelsoe C.. 2007. PRESENT: An ultra-lightweight block cipher. In Proceedings of the 9th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007). (Vienna, Austria, September 10-13, 2007), (Lecture Notes in Computer Science), Paillier Pascal and Verbauwhede Ingrid (Eds.), Vol. 4727. Springer, 450466.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. [4] Hong Deukjo, Sung Jaechul, Hong Seokhie, Lim Jongin, Lee Sangjin, Koo Bonseok, Lee Changhoon, Chang Donghoon, Lee Jesang, Jeong Kitae, Kim Hyun, Kim Jongsung, and Chee Seongtaek. 2006. HIGHT: A new block cipher suitable for low-resource device. In Proceedings of the 8th International Workshop on Cryptographic Hardware and Embedded Systems. Cryptographic Hardware and Embedded Systems (CHES 2006), (Yokohama, Japan, October 10-13, 2006), (Lecture Notes in Computer Science), Goubin Louis and Matsui Mitsuru (Eds.), Vol. 4249. Springer, 4659.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Beaulieu Ray, Shors Douglas, Smith Jason, Treatman-Clark Stefan, Weeks Bryan, and Wingers Louis. 2015. The SIMON and SPECK lightweight block ciphers. In Proceedings of the 52nd Annual Design Automation Conference(San Francisco, CA, June 7-11, 2015). ACM, 175:1–175:6.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Yang Gangqiang, Zhu Bo, Suder Valentin, Aagaard Mark D., and Gong Guang. 2015. The simeck family of lightweight block ciphers. In Proceedings of the 17th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007). (Vienna, Austria, September 10-13, 2007), (Eds.), Vol. 9293. Springer, 307329.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Banik Subhadeep, Pandey Sumit Kumar, Peyrin Thomas, Sasaki Yu, Sim Siang Meng, and Todo Yosuke. 2017. GIFT: A small present - towards reaching the limit of lightweight encryption. In Proceedings of the 19th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)., (Taipei, Taiwan, September 25-28, 2017),(Lecture Notes in Computer Science), Fischer Wieland and Homma Naofumi (Eds.), Vol. 10529. Springer, 321345.Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Cannière Christophe De. 2006. Trivium: A stream cipher construction inspired by block cipher design principles. In Proceedings of the 9th International Conference on Information Security (ISC 2006) (Samos Island, Greece, August 30 - September 2, 2006). (Lecture Notes in Computer Science), Katsikas Sokratis K., López Javier, Backes Michael, Gritzalis Stefanos, and Preneel Bart (Eds.), Vol. 4176. Springer, 171186.Google ScholarGoogle Scholar
  9. [9] Hell Martin, Johansson Thomas, and Meier Willi. 2007. Grain: A stream cipher for constrained environments. IJWMC 2, 1 (2007), 8693.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Babbage Steve and Dodd Matthew. 2008. The MICKEY stream ciphers. In New Stream Cipher Designs - The eSTREAM Finalists, Robshaw Matthew J. B. and Billet Olivier (Eds.). Lecture Notes in Computer Science, Vol. 4986. Springer, 191209.Google ScholarGoogle Scholar
  11. [11] Luo Yiyuan, Chai Qi, Gong Guang, and Lai Xuejia. 2010. A lightweight stream cipher WG-7 for RFID encryption and authentication. In Proceedings of the Global Communications Conference, 2010 (GLOBECOM 2010,) (Miami, FL, December 6-10, 2010),. IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Engels Daniel W., Saarinen Markku-Juhani O., Schweitzer Peter, and Smith Eric M.. 2011. The hummingbird-2 lightweight authenticated encryption algorithm. In Proceedings of the 7th International Workshop on RFID. Security and Privacy (RFIDSec 2011), (Amherst, Mass., June 26-28, 2011), Revised Selected Papers (Lecture Notes in Computer Science), Juels Ari and Paar Christof (Eds.), Vol. 7055. Springer, 1931.Google ScholarGoogle Scholar
  13. [13] Armknecht Frederik and Mikhalev Vasily. 2015. On lightweight stream ciphers with shorter internal states. In Proceedings of the 22nd International Workshop on Fast Software Encryption (FSE 2015) (Istanbul, Turkey, March 8-11, 2015). Revised Selected Papers (Lecture Notes in Computer Science), Leander Gregor (Ed.), Vol. 9054. Springer, 451470.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Hao Yonglin. 2015. A related-key chosen-IV distinguishing attack on full sprout stream cipher. IACR Cryptology ePrint Archive 2015 (2015), 231.Google ScholarGoogle Scholar
  15. [15] Zhang Bin and Gong Xinxin. 2015. Another tradeoff attack on sprout-like stream ciphers. In Advances in Cryptology - ASIACRYPT 2015 - Proceedings of the 21st International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2015) Part II (Auckland, New Zealand, November 29 - December 3)., Part II (Lecture Notes in Computer Science), Iwata Tetsu and Cheon Jung Hee (Eds.), Vol. 9453. Springer, 561585.Google ScholarGoogle Scholar
  16. [16] Roy Dibyendu and Mukhopadhyay Sourav. 2016. Fault analysis and weak key-IV attack on Sprout. IACR Cryptology ePrint Archive 2016 (2016), 207.Google ScholarGoogle Scholar
  17. [17] Lallemand Virginie and Naya-Plasencia María. 2015. Cryptanalysis of full sprout. In Proceedings of the 35th Annual Cryptology Conference, Advances in Cryptology (CRYPTO 2015) Part I (Santa Barbara, CA, Aug. 16-20, 2015). (Lecture Notes in Computer Science), Gennaro Rosario and Robshaw Matthew (Eds.), Vol. 9215. Springer, 663682.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Aminghafari Vahid and Hu Honggang. 2016. Fruit: Ultra-lightweight stream cipher with shorter internal state. IACR Cryptology ePrint Archive 2016 (2016), 355.Google ScholarGoogle Scholar
  19. [19] Mikhalev Vasily, Armknecht Frederik, and Müller Christian. 2016. On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol.2 (2016), 5279.Google ScholarGoogle Scholar
  20. [20] Ghafari Vahid Amin and Hu Honggang. 2018. Fruit-80: A secure ultra-lightweight stream cipher for constrained environments. Entropy 20, 3 (2018), 180.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Fan Xinxin, Mandal Kalikinkar, and Gong Guang. 2015. WG-8: A lightweight stream cipher for resource-constrained smart devices. EAI Endorsed Trans. Security Safety 2, 3 (2015), e4.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Wang Shichang, Liu Meicheng, Lin Dongdai, and Ma Li. 2019. Fast correlation attacks on grain-like small state stream ciphers and cryptanalysis of Plantlet, Fruit-v2 and Fruit-80. IACR Cryptology ePrint Archive 2019 (2019), 763.Google ScholarGoogle Scholar
  23. [23] Zhang Chunlan and Dong Lihua. 2020. An improved fast correlation attack on Fruit-80. In Proceedings of the 34th International Conference on Advanced Information Networking and Applications of Advanced Information Networking and Applications - , (AINA-2020) (Advances in Intelligent Systems and Computing), Barolli Leonard, Amato Flora, Moscato Francesco, Enokido Tomoya, and Takizawa Makoto (Eds.), Vol. 1151. Springer, 14261436.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Todo Yosuke, Meier Willi, and Aoki Kazumaro. 2019. On the data limitation of small-state stream ciphers: Correlation attacks on Fruit-80 and Plantlet. In Proceedings of the 26th International Conference on Selected Areas in Cryptography (SAC 2019) - , (Waterloo, ON, Canada, August 12-16, 2019). Revised Selected Papers (Lecture Notes in Computer Science), Paterson Kenneth G. and Stebila Douglas (Eds.), Vol. 11959. Springer, 365392.Google ScholarGoogle Scholar
  25. [25] Rivest Ronald L,. 1992. The rc4 encryption algorithm. rsa data security. Inc., March 12, 9 (1992), 2.Google ScholarGoogle Scholar
  26. [26] Anderson David P. and Herrtwich Ralf Guido. 1991. Internet communication with end-to-end performance guarantees. In Telekommunikation und Multimediale Anwendungen Der Informatik. Springer, 246258.Google ScholarGoogle ScholarCross RefCross Ref
  27. [27] ETSI/SAGE. 2006. Specification of the 3GPP confidentiality and integrity algorithms UEA2&UIA2. Document 2: SNOW 3G Specification, Version 1.1. http://www.gsmworld.com/using/algorithms/docs/etsi_sage_06_09_06.pdf. (2006).Google ScholarGoogle Scholar
  28. [28] Feng X. T.. 2011. ZUC algorithm: 3GPP LTE international encryption standard. Information Security and Communications Privacy 19, 12 (2011), 4546.Google ScholarGoogle Scholar
  29. [29] Bluetooth. 2005. Specification of the Bluetooth system. https://www.bluetooth.com/specifications/adoptedspecifications.Google ScholarGoogle Scholar
  30. [30] Papagiannopoulos Konstantinos and Verstegen Aram. 2013. Speed and size-optimized implementations of the PRESENT cipher for tiny AVR devices. In Proceedings of the 9th International Radio Frequency Identification - Security and Privacy Issues (RFIDsec 2013), (Graz, Austria, July 9-11, 2013), Revised Selected Papers (Lecture Notes in Computer Science), Hutter Michael and Schmidt Jörn-Marc (Eds.), Vol. 8262. Springer, 161175.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Beaulieu Ray, Shors Douglas, Smith Jason, Treatman-Clark Stefan, Weeks Bryan, and Wingers Louis. 2014. The Simon and Speck block ciphers on AVR 8-bit microcontrollers. In Proceedings of the 3rd International Workshop on Lightweight Cryptography for Security and Privacy (LightSec 2014), (Istanbul, Turkey, September 1-2, 2014), Revised Selected Papers (Lecture Notes in Computer Science), Eisenbarth Thomas and Öztürk Erdinç (Eds.), Vol. 8898. Springer, 320.Google ScholarGoogle Scholar
  32. [32] Park Taehwan, Seo Hwajeong, Park Chanhui, and Kim Howon. 2018. Parallel implementation of simeck family block cipher by using ARM NEON. In Proceedings of the 10th International Conference on Ubiquitous and Future Networks, (ICUFN 2018) (Prague, Czech Republic, July 3-6, 2018). IEEE, 703707.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Yang Gangqiang, Fan Xinxin, Aagaard Mark D., and Gong Guang. 2013. Design space exploration of the lightweight stream cipher WG-8 for FPGAs and ASICs. In Proceedings of the Workshop on Embedded Systems Security, WESS 2013, (Montreal, Quebec, Canada, September 29 - October 4, 2013). ACM, 8:1–8:10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Fan Xinxin, Zidaric Nusa, Aagaard Mark D., and Gong Guang. 2013. Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic. In TrustED’13, Proceedings of the 2013 ACM Workshop on Trustworthy Embedded Devices, Co-located with CCS 2013, (November 4, 2013, Berlin, Germany), Sadeghi Ahmad-Reza, Armknecht Frederik, and Seifert Jean-Pierre (Eds.). ACM, 2134.Google ScholarGoogle Scholar
  35. [35] Zidaric Nusa, Aagaard Mark D., and Gong Guang. 2019. Hardware optimizations and analysis for the WG-16 cipher with tower field arithmetic. IEEE Trans. Computers 68, 1 (2019), 6782.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Elbirt Adam J., Yip W., Chetwynd B., and Paar Christof. 2001. An FPGA-based performance evaluation of the AES block cipher candidate algorithm finalists. IEEE Trans. Very Large Scale Integr. Syst. 9, 4 (2001), 545557.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. [37] Mroczkowski P.. 2001. Implementation of the block cipher Rijndael using Altera FPGA. Journal of Telecommunications and Information Technology (2001), 8086.Google ScholarGoogle Scholar
  38. [38] Armknecht Frederik, Hamann Matthias, and Mikhalev Vasily. 2014. Lightweight authentication protocols on ultra-constrained RFIDs - Myths and facts. In Proceedings of the 10th International Workshop on Radio Frequency Identification: Security and Privacy Issues (RFIDSec 2014), (Oxford, UK, July 21-23, 2014). Revised Selected Papers (Lecture Notes in Computer Science), Saxena Nitesh and Sadeghi Ahmad-Reza (Eds.), Vol. 8651. Springer, 118. DOI:Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Hwang David, Chaney Mark, Karanam Shashi, Ton Nick, and Gaj Kris. 2008. K.: Comparison of FPGA targeted hardware implementations of eSTREAM stream cipher candidates. In State of the Art of Stream Ciphers Workshop, (SASC 2008). 151162.Google ScholarGoogle Scholar
  40. [40] Shi Zhengyuan, Chen Cheng, Yang Gangqiang, Xiong Hailiang, Li Fudong, Hu Honggang, and Wan Zhiguo. 2022. Design space exploration of Galois and Fibonacci configuration based on espresso stream cipher. ACM Transactions on Reconfigurable Technology and Systems (2022), 24.Google ScholarGoogle Scholar
  41. [41] Hamann Matthias, Krause Matthias, and Meier Willi. 2017. LIZARD - A lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017, 1 (2017), 4579.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Kitsos Paris, Sklavos Nicolas, Provelengios George, and Skodras Athanassios N.. 2013. FPGA-based performance analysis of stream ciphers ZUC, Snow3g, Grain V1, Mickey V2, Trivium and E0. Microprocess. Microsystems 37, 2 (2013), 235245.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Kasper Markus, Kumar Sandeep, Lemke-Rust Kerstin, and Paar Christof. 2006. A compact implementation of Edon80. eSTREAM, ECRYPT Stream Cipher Project, Report, 57 (2006).Google ScholarGoogle Scholar
  44. [44] Gaj Kris, Southern Gabriel, and Bachimanchi Ramakrishna. 2007. Comparison of hardware performance of selected Phase II eSTREAM candidates. In State of the Art of Stream Ciphers Workshop (SASC’07), eSTREAM, ECRYPT Stream Cipher Project, Report, Vol. 26, 2007.Google ScholarGoogle Scholar
  45. [45] Hamann Matthias, Krause Matthias, Meier Willi, and Zhang Bin. 2018. Design and analysis of small-state grain-like stream ciphers. Cryptogr. Commun. 10, 5 (2018), 803834.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Rukhin Andrew, Soto Juan, Nechvatal James, Smid Miles, and Barker Elaine. 2001. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. Technical Report. Booz-Allen and Hamilton, Inc. Mclean, VA.Google ScholarGoogle Scholar
  47. [47] Mandal Kalikinkar, Fan Xinxin, and Gong Guang. 2016. Design and implementation of warbler family of lightweight pseudorandom number generators for smart devices. ACM Trans. Embedded Comput. Syst. 15, 1 (2016), 1:1–1:28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Daemen Joan, Massolino Pedro Maat Costa, Mehrdad Alireza, and Rotella Yann. 2020. The subterranean 2.0 cipher suite. IACR Transactions on Symmetric Cryptology (2020), 262294.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Li Bohan, Liu Meicheng, and Lin Dongdai. 2020. FPGA implementations of Grain v1, Mickey 2.0, Trivium, Lizard and Plantlet. Microprocessors and Microsystems 78 (2020), 103210. Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Vahidi. 2008. grain. https://github.com/freecores/grain.Google ScholarGoogle Scholar

Index Terms

  1. Hardware Optimizations of Fruit-80 Stream Cipher: Smaller than Grain

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Reconfigurable Technology and Systems
          ACM Transactions on Reconfigurable Technology and Systems  Volume 16, Issue 2
          June 2023
          451 pages
          ISSN:1936-7406
          EISSN:1936-7414
          DOI:10.1145/3587031
          • Editor:
          • Deming Chen
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 March 2023
          • Online AM: 25 October 2022
          • Accepted: 8 October 2022
          • Revised: 31 August 2022
          • Received: 2 June 2022
          Published in trets Volume 16, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)384
          • Downloads (Last 6 weeks)58

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!