Symmetric Key Protocols Including Ciphers

Part of the Embedded Systems book series (EMSY)


The objectives of cipher design as well as a brief description of some common ciphers, which have become standards, will be covered in this chapter. In addition to highlighting two general categories of ciphers, key streaming and block ciphers, some ciphers that have interesting properties relevant for embedded systems are also covered. Additionally various modes of cipher operation as well as schemes providing not only confidentiality but also authentication are covered. Finally hardware as well as software implementation notes are provided in each section.


Block Cipher Stream Cipher Message Authentication Code Linear Feedback Shift Register FPGA Implementation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Adams C (1997) The CAST-128 encryption algorithm. RFC 2144, network working group, request for comment 2144Google Scholar
  2. Anderson R, Biham E, Knudsen L (1998) Serpent: a flexible block cipher with maximum assurance, First AES candidate conference.
  3. Barker WC (2008) Recommendation for the triple data encryption algorithm (TDEA) block cipher. NIST SP800–67Google Scholar
  4. Bellare M, Rogawayy P, Wagner D (2003) A conventional authenticated-encryption mode 464
  5. Bjorstad TE (2008) An introduction to new stream cipher designs. Presentation at 25th Chaos Communication Congress.
  6. Bogdanov A et al (2007) PRESENT: a ultra-lightweight block cipher. CHES 2007 LNCS 4727:450–466Google Scholar
  7. Dworkin M (2001) Recommendation for block cipher modes of operation – methods and techniques. National Institute of Standards and Technology, NIST special publication 800–38AGoogle Scholar
  8. Dworkin M (2004) Recommendation for block cipher modes of operation – the CCM mode for authentication and confidentiality. National Institute of Standards and Technology, NIST special publication 800–38CGoogle Scholar
  9. Dworkin M (2007) Recommendation for block cipher modes of operation – Galois/Counter Mode (GCM) and GMAC. National Institute of Standards and Technology, NIST special publication 800–38DGoogle Scholar
  10. Evans DL, Bond PJ, Bement AL (2001) Recommendation for block cipher modes of operation. NIST special publication 800–38AGoogle Scholar
  11. Feistel H (1973) Cryptography and computer privacy. Sci Am 228(5):15–23CrossRefGoogle Scholar
  12. FIPS-197 (2001) Specification for the advanced encryption standard (AES). Federal Information Processing Standards Publication 197Google Scholar
  13. Fluhrer S, Mantin I, Shamir A (2002) Attacks on RC4 and WEP. CryptoBytes 5(2):26–34Google Scholar
  14. Gaisler A (2008) AES/ECC. view&id=205&Itemid=152
  15. Gladman B (2003) A specification for Rijndael, the AES algorithm.–19Google Scholar
  16. Habinc S (2006a) GRAES – advanced encryption standard (AES) IP core user’s manual. Gaisler Research.
  17. Habinc S (2006b) GRECC – ECC IP core user’s manual. Gaisler Research.
  18. Hell M et al (2005) Grain – a stream cipher for constrained environments. Intl J Wireless Mobile Comput 2(1):86–93CrossRefGoogle Scholar
  19. Hell M et al (2006) A stream cipher proposal: Grain-128. IEEE Intl Symp Info Theory 1614–1618Google Scholar
  20. Hodjat A et al (2004) A 21.54 Gbps fully pipelined AES processor on FPGA. FCCM 2004Google Scholar
  21. Hong D et al (2006) HIGHT: a new block cipher suitable for low-resource device. CHES 2006 LNCS 4249:46–59Google Scholar
  22. Lemsitzer S et al (2007) Multi-gigabit GCM-AES architecture optimized for FPGAs. CHES 2007 LNCS 4727:227–238Google Scholar
  23. Lim YI et al (2009) Implementation of HIGHT cryptic circuit for RFID tag. IEICE Electron Exp 6(4):180–186CrossRefGoogle Scholar
  24. Meyer CH, Tuchman WL (1972) Pseudo-random codes can be cracked. Electron Des 23:74–76Google Scholar
  25. Meyer CH, Tuchman WL (1979) Design considerations for cryptography. Proc NCC 42:594–597Google Scholar
  26. Paar C (2008) New directions in lightweight cryptographic primitives for RFID applications. Presentation at RFID CUSP WorkshopGoogle Scholar
  27. Potlapally R et al. (2003) Analyzing the energy consumption of security protocols. ISLPED, doi:10.1109/LPE.2003.1231830:30–35Google Scholar
  28. Robshaw M (2007) Low cost cryptography. Presentation at
  29. RSA website
  30. Satoh A et al (2009) High performance hardware architectures for galois counter mode. IEEE Trans Comput 58(7):917–930CrossRefGoogle Scholar
  31. Schneier B (1996) Applied cryptography. Wiley, New YorkGoogle Scholar
  32. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656–715MATHMathSciNetGoogle Scholar
  33. Shirai T, Mizuno A (2007) A compact and high speed cipher suitable for limited resource environment. 3rd ETSI security workshop presentation, Sophia-Antipolis, FranceGoogle Scholar
  34. Standaert F-X et al (2003) Efficient implementation of Rijndael encryption in reconfigurable hardware. CHES 2003, LNCS 2779:334–350Google Scholar
  35. Stinson DR (2006) Cryptography, 3rd edn. Chapman and Hall/CRC, Boca Raton, FLMATHGoogle Scholar
  36. Wang SS, Ni WS (2004) An efficient implementation of AES algorithm. ISCAS II:597–600Google Scholar
  37. Wheeler DJ, Needham RM (1994) TEA a tiny encryption algorithm. Fast sofware encryption. LNCS 1008:363–366Google Scholar
  38. Yang B et al (2005) High speed architecture for Galois/counter mode of operation (GCM), IACR tech report 146. Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Department of Electrical & Computer EngineeringUniversity of WaterlooWaterlooCanada

Personalised recommendations