5 CONCLUSIONS
This paper presented the evaluation results of sev-
eral FPGA implementations of K2 v2.0: high
speed implementations and compact implementa-
tions. The quad-keystream implementation is ex-
pected to achieved 5 Gbps on a Spartan-3 FPGA im-
plementation, and the circuit size of the compact im-
plementation of K2 is 2133 on Spartan-II. Further-
more, we evaluated the efficiency of the implementa-
tions using two benchmarks: throughput per area and
the normalized efficiency. The implementationsof K2
has high efficiency compared with other stream ci-
phers, and its efficiency is 4-10 times higher than AES
implementations. The evaluation results suggested
that the FPGA implementation of K2 is suitable for
applications using high speed encryption/decryption.
REFERENCES
Bulens, P., Kalach, K., Standaetes, F. X., and Quisquater,
J. J. (2007). FPGA implementations of estream phase-
2 focus candidates with hardware profile. In SASC
2007 Workshop Record, pages 205–214. eSTREAM
Project.
Chodowiec, P. and Gaj, K. (2003). Very compact FPGA
implementation of the AES algorithm. In Proc.
of CHES’03, LNCS, volume 2779, pages 319–333.
Springer Verlag.
Daemen, J. and Rijmen, V. (1998). The Design of Rijn-
dael, Information Security and Cryptography, Texts
and Monographs. Springer Verlag.
Ekdahl, P. and Johansson, T. (2000). SNOW -a new stream
cipher. The NESSIE submission paper.
Galanis, M. D., Kitsos, P., Kostopoulos, G., and
Koufopavlou, O. (2004). Comparison of the perfor-
mance of stream ciphers for wireless communications.
In Proc. of CCCT’04, pages 113–118.
Good, M. and Benaissa, M. (2005). AES on FPGA from the
fastest to the smallest. In Proc. of CHES’05, LNCS,
volume 3659, pages 427–440. Springer Verlag.
Good, T., Chelton, W., and Benaissa, M. (2006). Review
of stream cipher candidates from a low resource hard-
ware perspective. In SASC 2006 Workshop Record.
eSTREAM Project.
Hwang, D., Chaney, M., Karanam, S., Ton, N., and Gaj,
K. (2008). Comparison of FPGA-targeted hardware
implementations of eSTREAM stream cipher candi-
dates. In SASC 2008 Workshop Record, pages 151–
162. eSTREAM Project.
Kasper, M., Kumar, S., Lemke-Rust, K., and Paar, C.
(2006). A compact implementation of edon80. eS-
TREAM Report 2006/057.
Kiyomoto, S., Tanaka, T., and Sakurai, K. (2007a). K2: A
stream cipher algorithm using dynamic feedback con-
trol. In Proc. of SECRYPT 2007, pages 204–213. IN-
STICC PRESS.
Kiyomoto, S., Tanaka, T., and Sakurai, K. (2007b). A word-
oriented stream cipher using clock control. In SASC
2007 Workshop Record, pages 260–274. eSTREAM
Project.
Rodr´ıguez-Henr´ıquez, F., Saqib, N. A., D´ıaz-Perez, A., and
Koc, C. K. (2007). Cryptographic algorithms on re-
configurable hardware. Signals and Communication
Technology, Springer.
Rose, G. and Hawkes, P. (1999). The t-class of SOBER
stream cipher. Publication Document, QUALCOMM
Australia.
Rouvroy, G., Standaert, F. X., Quisquater, J. J., and
Legat, J. D. (2004). Compact and efficient encryp-
tion/decryption module for FPGA implementation of
the AES Rijndael very well suited for small embedded
applications. In Proc. of ITCC 2004, volume 2, pages
583–587.
Rudra, A., Dubey, P. K., Julta, C. S., Kumar, V., Rao, J. R.,
and Rohatgi, P. (2001). Efficient rijndael encryption
implementation with composite field arithmetic. In
Proc. of CHES’01, LNCS, volume 2162, pages 171–
184. Springer Verlag.
Standaert, F. X., Rouvroy, G., Quisquater, J.-J., and Legat,
J.-D. (2003). Efficient implementation of rijndael en-
cryption in reconfiqurable hardware: Improvements
and design tradeoffs. In Proc. of CHES’03, LNCS,
volume 2779, pages 334–350. Springer Verlag.
FPGA-TARGETED HARDWARE IMPLEMENTATIONS OF K2
277