Hardware Architectures for Cryptanalysis
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F68407700%3A21230%2F11%3A00176104" target="_blank" >RIV/68407700:21230/11:00176104 - isvavai.cz</a>
Nalezeny alternativní kódy
RIV/68407700:21240/11:00176104
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Hardware Architectures for Cryptanalysis
Popis výsledku v původním jazyce
In this work we explore the resistance of ciphers KeeLoq, Hitag-2, PRESENT and Cryptomeria against variants of brute-force attacks. The ciphers are dedicated for a Lightweight Cryptography, i.e. they find their application area in smartcards or car immobilizers. The ciphers KeeLoq, Hitag-2 and Cryptomeria are used in practice, while the cipher PRESENT has been designed as a replacement for outdated ciphers. We design hardware architectures for cryptanalysis of these ciphers. The architectures are implemented in FPGAs. Where possible, the Cost-Optimized Parallel Code Breaker COPACOBANA is used. The main contribution of this work will insist in (i) design of architectures supporting brute-force attack on individual ciphers and (ii) evaluation of the resistance against brute-force attacks for those ciphers.
Název v anglickém jazyce
Hardware Architectures for Cryptanalysis
Popis výsledku anglicky
In this work we explore the resistance of ciphers KeeLoq, Hitag-2, PRESENT and Cryptomeria against variants of brute-force attacks. The ciphers are dedicated for a Lightweight Cryptography, i.e. they find their application area in smartcards or car immobilizers. The ciphers KeeLoq, Hitag-2 and Cryptomeria are used in practice, while the cipher PRESENT has been designed as a replacement for outdated ciphers. We design hardware architectures for cryptanalysis of these ciphers. The architectures are implemented in FPGAs. Where possible, the Cost-Optimized Parallel Code Breaker COPACOBANA is used. The main contribution of this work will insist in (i) design of architectures supporting brute-force attack on individual ciphers and (ii) evaluation of the resistance against brute-force attacks for those ciphers.
Klasifikace
Druh
O - Ostatní výsledky
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
Z - Vyzkumny zamer (s odkazem do CEZ)<br>S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2011
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů