Faster 128-EEA3 and 128-EIA3 Software

  • Roberto AvanziEmail author
  • Billy Bob Brumley
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7807)


The 3GPP Task Force recently supplemented mobile LTE network security with an additional set of confidentiality and integrity algorithms, namely 128-EEA3 and 128-EIA3 built on top of ZUC, a new keystream generator. We contribute two techniques to improve the software performance of these algorithms. We show how delayed modular reduction increases the efficiency of the LFSR feedback function, yielding performance gains for ZUC and thus both 128-EEA3 and 128-EIA3. We also show how to leverage carryless multiplication to evaluate the universal hash function making up the core of 128-EIA3. Our software implementation results on Qualcomm’s Hexagon DSP architecture indicate significant performance gains when employing these techniques: up to roughly a 2.4-fold and a 4-fold throughput improvement for 128-EEA3 and 128-EIA3, respectively.


Stream ciphers Universal hash functions ZUC  128-EEA3 128-EIA3 Carryless multiplication LTE 



We thank Alex Dent for his input on EIA3 performance optimizations.


  1. 1.
    ETSI/SAGE: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3: 128-EEA3 & 128-EIA3 specification. Document 1, Version 1.7 (2011)Google Scholar
  2. 2.
    ETSI/SAGE: Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3: ZUC specification. Document 2, Version 1.6 (2011)Google Scholar
  3. 3.
    Kitsos, P., Sklavos, N., Skodras, A.N.: An FPGA implementation of the ZUC stream cipher. In: DSD, pp. 814–817. IEEE (2011)Google Scholar
  4. 4.
    Wang, L., Jing, J., Liu, Z., Zhang, L., Pan, W.: Evaluating optimized implementations of stream cipher ZUC algorithm on FPGA. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) ICICS 2011. LNCS, vol. 7043, pp. 202–215. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  5. 5.
    Traboulsi, S., Pohl, N., Hausner, J., Bilgic, A., Frascolla, V.: Power analysis and optimization of the ZUC stream cipher for LTE-advanced mobile terminals. In: Proceedings of the 3rd IEEE Latin American Symposium on Circuits and Systems (LASCAS 2012), pp. 1–4, Playa del Carmen, Mexico (2012)Google Scholar
  6. 6.
    Kitsos, P., Sklavos, N., Provelengios, G., Skodras, A.N.: FPGA-based performance analysis of stream ciphers ZUC, SNOW3G, Grain V1, Mickey V2, Trivium and E0. Microprocess. Microsyst. Embed. Hardware Des. 37, 235–245 (2013)CrossRefGoogle Scholar
  7. 7.
    Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129–139. Springer, Heidelberg (1994) Google Scholar
  8. 8.
    Lim, C.H., Hwang, H.S.: Fast implementation of elliptic curve arithmetic in GF(p). In: Imai, H., Zheng, Y. (eds.) PKC 2000. LNCS, vol. 1751, pp. 405–421. Springer, Heidelberg (2000) CrossRefGoogle Scholar
  9. 9.
    Gonda, M., Matsuo, K., Aoki, K., Chao, J., Tsujii, S.: Improvements of addition algorithm on genus 3 hyperelliptic curves and their implementation. IEICE Trans. 88–A, 89–96 (2005)CrossRefGoogle Scholar
  10. 10.
    Avanzi, R., Mihailescu, P.: Generic efficient arithmetic algorithms for PAFFs (Processor Adequate Finite Fields) and related algebraic structures(extended abstract). In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 320–334. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  11. 11.
    Avanzi, R.M.: Aspects of hyperelliptic curves over large prime fields in software implementations. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 148–162. Springer, Heidelberg (2004) CrossRefGoogle Scholar
  12. 12.
    Gueron, S., Kounavis, M.E.: Efficient implementation of the Galois counter mode using a carry-less multiplier and a fast reduction algorithm. Inf. Process. Lett. 110, 549–553 (2010)zbMATHMathSciNetCrossRefGoogle Scholar
  13. 13.
    Taverne, J., Faz-Hernández, A., Aranha, D.F., Rodríguez-Henríquez, F., Hankerson, D., López, J.: Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 108–123. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  14. 14.
    Aranha, D.F., Faz-Hernández, A., López, J., Rodríguez-Henríquez, F.: Faster implementation of scalar multiplication on Koblitz curves. In: Hevia, A., Neven, G. (eds.) LatinCrypt 2012. LNCS, vol. 7533, pp. 177–193. Springer, Heidelberg (2012) CrossRefGoogle Scholar
  15. 15.
    Oliveira, T., López, J., Aranha, D.F., Rodríguez-Henríquez, F.: Two is the fastest prime. Cryptology ePrint Archive, report 2013/131 (2013).
  16. 16.
    Rose, G.G.: A stream cipher based on linear feedback over \(GF(2^8)\). In: Dawson, E., Boyd, C. (eds.) ACISP 1998. LNCS, vol. 1438, pp. 135–146. Springer, Heidelberg (1998) CrossRefGoogle Scholar
  17. 17.
    Forward Concepts: Qualcomm Leads in Global DSP Silicon Shipments (2012).
  18. 18.
    Nevelsteen, W., Preneel, B.: Software performance of universal hash functions. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 24–41. Springer, Heidelberg (1999) Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Qualcomm Product Research GermanyMunichGermany
  2. 2.Department of Pervasive ComputingTampere University of TechnologyTampereFinland

Personalised recommendations