Authors L.K. Babenko, D.V. Golotin
Month, Year 05, 2015 @en
Index UDC 004.056.55
Abstract The trend of mass transfer from the Internet PC to Internet of things (Internet of Things, IoT) poses new challenges to ensure the reliability and safety of the networks. Wireless transmission medium, dynamic changing topology, lack of infrastructure, large data stream, - these factors allow an attacker to easily analyze network vulnerabilities and implement an attack. One of the main means of information protection is the use of cryptographic algorithms. Due to the fact that many mobile devices, often have a small size, and there are restrictions on the time and memory resources. These restrictions apply to the cryptographic schemes, opening a new direction «Lightweight cryptography algorithms». Building effective hardware implementations of specially developed encryption algorithms is relevant and defined objectives Lightweight cryptography. The purpose of this article - to create a program model stream cipher Lightweight cryptography Trivium, to conduct its investigation and to familiarize professionals with the features of construction and operation of this algorithm, with the characteristics. The programming model is to be visible and be able to apply it in the educational process. The article considers the structure, the description of the algorithm Trivium, assess the feasibility of software and hardware implementation. Trivium structure consists of three shift registers with feedback, which together form a pseudo-random sequence (PRS). Modulo two like bits of plaintext bits and cap defines cryptogram. The initialization procedure is performed based on a predetermined secret key and initialization vector. To study and analyze opportunities Trivium algorithm software model was developed that allows to visualize the processes that occur in the course of this cipher. Software model can be used to teach students the basics of stream encryption algorithm on the example of Trivium. When using encryption to achieve the objectives few resource cryptography is necessary to assess its ability to hardware implementation. To this end, the article discusses the implementation of some of the blocks are encrypted using programmable logic (FPGAs) Altera, are fragments of the description of the language VHDL, the characteristics of software and hardware implementation.

Download PDF

Keywords Stream encryption; algorithm Trivium; few resource cryptography; programming model; hardware implementation; design using FPGAs.
References 1. Zhukov A.E. Legkovesnaya kriptografiya [Lightweight cryptography], Voprosy kiberbezopasnosti [Cybersecurity Issues], 2015, No. 1 (9), pp. 26-43.
2. Axel York Poschmann. Lightweight cryptography Cryptographic Engineering for a PervasiveWorld. Dissertation for the degree Doktor-Ingenieur Faculty of Electrical Engineering and Information Technology Ruhr-University Bochum, Germany, 2013.
3. Kyazhin S.N., Moiseev A.V. Kriptografiya v oblachnykh vychisleniyakh: sovremennoe sostoyanie i aktual'nye zadachi [Cryptography in cloud computing: current state and challenges]. Available at:
4. Lourens Kruz. Internet veshchey i informatsionnaya bezopasnost' [The Internet of things and information security]. Available at: web/RU/news/releases/txt/2013/03/032813c.html (Accessed 20 March 2014).
5. Bogdanov А., Knudsen L.R., Leander G., Paar C., Poschmann A. Matthew Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cipher. In CHS 2007, volume 7427 of Lecture Notes in Computer Science, Springer Verlag, 2007, pp. 450-466.
6. Panasenko S., Smagin S. Lightweight Cryptography: Underlying Principles and Approaches. International, Journal of Computer Theory and Engineering, August 2011, Vol. 3, No. 4, pp. 516-520.
7. Canni`ere C.D., Dunkelman O., and M. Knezevic. KATAN and KTANTAN a Family of Small and Efficient Hardware-Oriented Block Ciphers, CHES 2009, LNCS 5747. Springer-Verlag, 2009, pp. 272-278.
8. Julio Cesar Hernandez-Castro1, Pedro Peris-Lopez2, Jean-Philippe Aumasson. On the Key Schedule Strength of PRESENT. School of Computing, Portsmouth University, UK, Information Security & Privacy Lab, TU-Delft, The NetherlandsNagravisionSA, Cheseaux, Switzerland.
9. The 128-bit Blockcipher CLEFIA. Security and Performance Evaluations. Revision 1.0, June 1, Sony Corporation, 2007.
10. Toru Akishita and Harunaga Hiwatari. Very Compact Hardware Implementations of the Blockcipher CLEFIA. Sony Corporation: {Toru.Akishita,Harunaga.Hiwatari}
11. Shirai T., Shibutani K., Akishita T., Moriai S., and Iwata T. Hardware Implementations of the 128-bit Blockcipher CLEFIA, Technical Report of IEICE, 2007, Vol. 107, No. 141, ISEC2007–49, pp. 29-36, (in Japanese).
12. Moradi A. Poschmann, S. Ling C. Paar, and H. Wang. Pushing the Limits:A Very Compact and a Threshold Implementation of AES”, EUROCRYPT 2011, LNCS 6632. Springer-Verlag, 2011, pp. 69-88.
13. Babenko L.K., Bespalov D.A., Makarevich O.B., Chesnokov R.D., Trubnikov Ya.A. Razrabotka i issledovanie programmno-apparatnogo kompleksa shifrovaniya po algoritmu PRESENT dlya resheniya zadach maloresursnoy kriptografii [Software and hardware development and research of encryption algorithm PRESENT for solving problems of the lightweight cryptography], Izvestiya YuFU. Tekhnicheskie nauki [Izvestiya SFedU. Engineering Sciences], 2014, No. 2 (151), pp. 174-180.
14. Babenko L.K., Bespalov D.A., Makarevich O.B., Chesnokov R.D. Razrabotka i issledovanie sredst maloresursnoy kriptografii na primere algoritmov PRESENT I CLEFIA [Research and development funds metaresources cryptography example algorithms PRESENT AND CLEFIA], Materialy konferentsii "Informatsionnye tekhnologii v upravlenii" (ITU-2014) [The proceedings of the conference "Information technologies in management" (IUT-2014)]. St. Petersburg: OAO "Kontsern "TsNII "Elektropribor", 2014.
15. C. De Canni`ere & B. Preneel. TRIVIUM Specifications. eSTREAM, ECRYPT Stream Cipher Project [электронный ресурс]. Available at: trivium/trivium_p3.pdf (Accessed: 14 February 2014).
16. Yun Tian, Gongliang Chen, Jianhua Li. Quavium - A New Stream Cipher Inspired by Trivium, JCP journal of computers, 2012, Vol. 7, No. 5, pp. 1278-1283.
17. Varfolomeev A.A., Zhukov A.E., Pudovkina M.A. Potochnye kriptosistemy. Osnovnye svoystva i metody analiza stoykosti. Uchebnoe posobie [Stream cryptosystem. Basic properties and methods of strength analysis. Tutorial]. Moscow: PAIMS, 2000, 272 p.
18. Shifrovanie dannykh v Perl programmakh (crypt perl howto). Available at:
19. Babilo P.N. Osnovy yazyka VHDL [The basics of the language VHDL]. 2 nd ed. Moscow: Solon–R, 2002, 218 p.
20. Sergienko A.M. VHDL dlya proektirovaniya vychislitel'nykh ustroystv [VHDL for the design of computing devices]. Izd-vo: TID DS, 2003, 208 p.
21. VHDL: A logic synthesis approach Hardcover: D. Naylor, S. Jones. Cambridge University Press, July 31, 199, 324 p.

Comments are closed.