Hardware Framework for the Rabbit Stream Cipher

  • Deian Stefan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6151)


Rabbit is a software-oriented synchronous stream cipher with very strong security properties and support for 128-bit keys. Rabbit is part of the European Union’s eSTREAM portfolio of stream ciphers addressing the need for strong and computationally efficient (i.e., fast) ciphers. Extensive cryptanalysis confirms Rabbit’s strength against modern attacks; attacks with complexity lower than an exhaustive key search have not been found. Previous software implementations have demonstrated Rabbit’s high throughput, however, the performance in hardware has only been estimated. Three reconfigurable hardware designs of the Rabbit stream cipher – direct, interleaved and generalized folded structure (GFS) – are presented. On the Xilinx Virtex-5 LXT FPGA, a direct, resource-efficient (568 slices) implementation delivers throughputs of up to 9.16 Gbits/s, a 4-slow interleaved design reaches 25.62 Gbits/s using 1163 slices, and a 3-slow 8-GFS implementations delivers throughputs of up to 3.46 Gbits/s using only 233 slices.


FPGA Rabbit eSTREAM DSP Stream Cipher 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cryptico A/S. Differential properties of the g-function (2003),
  2. 2.
    Aumasson, J.P.: On a bias of Rabbit. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)Google Scholar
  3. 3.
    Babbage, S., Canniere, C., Canteaut, A., Cid, C., Gilbert, H., Johansson, T., Parker, M., Preneel, B., Rijmen, V., Robshaw, M.: The eSTREAM Portfolio. In: eSTREAM, ECRYPT Stream Cipher Project (2008)Google Scholar
  4. 4.
    Barker, E.B., Nechvatal, M.S., Barker, E., Leigh, S., Levenson, M., Vangel, M., Discussion, G., Studies, E.: A Statistical Test Suite For Random And Pseudorandom Number Generators For Cryptographic ApplicationsGoogle Scholar
  5. 5.
    Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. LNCS, pp. 1–13. Springer, Heidelberg (2000)Google Scholar
  6. 6.
    Boesgaard, M., Vesterager, M., Christensen, T., Zenner, E.: The Stream Cipher Rabbit. In: ECRYPT Stream Cipher Project Report 6 (2005)Google Scholar
  7. 7.
    Boesgaard, M., Vesterager, M., Pedersen, T., Christiansen, J., Scavenius, O.: Rabbit: A new high-performance stream cipher. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 307–329. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Boesgaard, M., Vesterager, M., Zenner, E.: The Stream Cipher Rabbit. In: Robshaw, M.J.B., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 69–83. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Bos, J.W., Casati, N., Osvik, D.A.: Multi-stream hashing on the playstation 3. In: International Workshop on State-of-the-Art in Scientific and Parallel Computing 2008, Minisymposium on Cell/B.E. Technologies (2008)Google Scholar
  10. 10.
    Bulens, P., Kalach, K., Standaert, F.X., Quisquater, J.J.: FPGA implementations of eSTREAM phase-2 focus candidates with hardware profile. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)Google Scholar
  11. 11.
    Bulens, P., Standaert, F.X., Quisquater, J.J., Pellegrin, P., Rouvroy, G.: Implementation of the AES-128 on Virtex-5 FPGAs. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 16–26. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  13. 13.
    Ferro, E., Potorti, F.: Bluetooth and Wi-Fi wireless protocols: a survey and a comparison. IEEE Wireless Communications 12(1), 12–26 (2005)CrossRefGoogle Scholar
  14. 14.
    Gaj, K., Southern, G., Bachimanchi, R.: Comparison of hardware performance of selected Phase II eSTREAM candidates. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)Google Scholar
  15. 15.
    Goldreich, O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, New York (2000)Google Scholar
  16. 16.
    Hauck, S., DeHon, A.: Reconfigurable Computing: The Theory and Practice of FPGA-Based Computation. Morgan Kaufmann, San Francisco (2007)Google Scholar
  17. 17.
    Hodjat, A., Verbauwhede, I.: A 21.54 Gbits/s fully pipelined AES processor on FPGA. In: 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, FCCM 2004, pp. 308–309 (2004)Google Scholar
  18. 18.
    Kitsos, P., Kostopoulos, G., Sklavos, N., Koufopavlou, O.: Hardware implementation of the RC4 stream cipher. In: Proceedings of the 46th IEEE International Midwest Symposium on Circuits and Systems, MWSCAS 2003, vol. 3 (2003)Google Scholar
  19. 19.
    Leglise, P., Standaert, F.X., Rouvroy, G., Quisquater, J.J.: Efficient implementation of recent stream ciphers on reconfigurable hardware devices. In: 26th Symposium on Information Theory in the Benelux, pp. 261–268 (2005)Google Scholar
  20. 20.
    Lu, Y., Wang, H., Ling, S.: Cryptanalysis of Rabbit. In: Proceedings of the 11th International Conference on Information Security, pp. 204–214. Springer, Heidelberg (2008)Google Scholar
  21. 21.
    Mao, W.: Modern Cryptography: Theory and Practice. Prentice Hall Professional Technical Reference (2003)Google Scholar
  22. 22.
    Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography. CRC Press, Boca Raton (1997)zbMATHGoogle Scholar
  23. 23.
    Parhi, K.K.: VLSI Digital Signal Processing Systems: Design and Implementation. Wiley, Chichester (1999)Google Scholar
  24. 24.
    Schneier, B.: Applied Cryptography Second Edition: protocols, algorithms, and source code in C. John Wiley and Sons, Chichester (1996)Google Scholar
  25. 25.
    Stefan, D., Mitchell, C.: Parallelized Hardware Implementation of the MICKEY-128 2.0 Stream Cipher. In: State of the Art of Stream Ciphers Workshop (SASC 2007), eSTREAM, ECRYPT Stream Cipher Project, Report (2007)Google Scholar
  26. 26.
    I.A. UEA2&UIA. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2& UIA2. Document 2: SNOW 3G Specifications. Version: 1.1. ETSI/SAGE Specification (2006)Google Scholar
  27. 27.
    Weaver, N., Markovskiy, Y., Patel, Y., Wawrzynek, J.: Post-placement C-slow retiming for the Xilinx Virtex FPGA. In: Proceedings of the 2003 ACM/SIGDA Eleventh International Symposium on Field Programmable Gate Arrays, pp. 185–194. ACM, New York (2003)CrossRefGoogle Scholar
  28. 28.
    Wee, C.M., Sutton, P.R., Bergmann, N.W., Williams, J.A.: Multi stream cipher architecture for reconfigurable system-on-chip. In: International Conference on Field Programmable Logic and Applications, FPL 2006, pp. 1–4 (August 2006)Google Scholar
  29. 29.

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Deian Stefan
    • 1
  1. 1.S*ProCom2, Dept. of Electrical EngineeringThe Cooper UnionNew YorkUSA

Personalised recommendations