PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Efficiency of FPGA architectures in implementations of AES, Salsa20 and Keccak cryptographic algorithms

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The aim of this paper is to test efficiency of automatic implementation of selected cryptographic algorithms in two families of popular-grade FPGA devices from Xilinx: Spartan-3 and Spartan-6. The set of algorithms include the Advanced Encryption Standard (AES) used worldwide as a symmetric cipher along with two hash algorithms: Salsa20 (developed with ECRYPT Stream Cipher Project) and Keccak permutation function (core of the new SHA-3 standard). The ciphers were expressed in 5 architectures: the basic iterative one (one instance of a round in hardware) and its four derivatives created by loop unrolling and pipelining. With each of the architectures implemented in both Spartan devices this gave the total of 30 test cases, which, upon automatic implementation, created a comprehensive and consistent base for comparison of the ciphers, applied architectures and FPGA devices used for implementation.
Rocznik
Strony
117--124
Opis fizyczny
Bibliogr. 17 poz., rys., tab.
Twórcy
autor
  • Wrocław University of Technology, Wrocław, Poland
Bibliografia
  • [1] ATHENa Database of FPGA Results, available at http://cryptography.gmu.edu/athenadb/fpga_hash, access date: March 2015.
  • [2] Bernstein, D. J. (2008). The Salsa20 family of stream ciphers. New Stream Cipher Designs. Springer, 84-97.
  • [3] Bertoni, G., Daemen, J., Peeters, M. & Van Assche, G. (2011). The Keccak reference. http://keccak.noekeon.org/, access date: March 2015.
  • [4] Gaj, K., Homsirikamol, E., Rogawski, M., Shahid, R. & Sharif, M. U. (2012).
  • Comprehensive evaluation of high-speed and medium-speed implementations of five SHA-3 finalists using Xilinx and Altera FPGAs. The Third SHA-3 Candidate Conference, Washington, DC, USA.
  • [5] Gaj, K., Kaps J. P., Amirineni, V., Rogawski, M., Homsirikamol, E. & Brewster, B.Y. (2010). ATHENa – Automated Tool for Hardware EvaluatioN: Toward Fair and Comprehensive Benchmarking of Cryptographic Hardware Using FPGAs. 20th International Conference on Field Programmable Logic and Applications, Milano, Italy.
  • [6] Gaj, K., Southern, G., & Bachimanchi, R. (2007). Comparison of hardware performance of selected Phase II eSTREAM candidates. Proc. State of the Art of Stream Ciphers Workshop, eSTREAM, ECRYPT Stream Cipher Project, Report, Vol. 26, p. 2007.
  • [7] Junkg, B. & Apfelbeck, J. (2011). Area-efficient FPGA implementations of the SHA-3 finalists. 2011 International Conference on Reconfigurable Computing and FPGAs (ReConFig), IEEE, 235-241.
  • [8] Liberatori, M., Otero, F., Bonadero, J.C. & Castineira, J. (2007). AES-128 Cipher. High Speed, Low Cost FPGA Implementation. Proc. Third Southern Conf. on Programmable Logic. Mar del Plata, Argentina, IEEE Comp. Soc. Press.
  • [9] National Institute of Standards and Technology (2001). Specification for the ADVANCED ENCRYPTION STANDARD (AES). Federal Information Processing Standards Publication 197. http://csrc.nist.gov/publications/PubsFIPS .html (accessed March 2015).
  • [10] Sugier, J. (2012). Implementation of symmetric block ciphers in popular-grade FPGA devices. Journal of Polish Safety and Reliability Association 3, 2, 179-187.
  • [11] Sugier, J. (2012). Implementing AES and Serpent ciphers in new generation of low-cost FPGA devices. Advances in Intelligent and Soft Computing: ComplexSystems and Dependability. Springer, 170, 273-288.
  • [12] Sugier, J. (2013). Implementing Salsa20 vs. AES and Serpent in Popular-Grade FPGA Devices. Advances in Intelligent and Soft computing: New Results in Dependability and Complex Systems. Proc. 8th Int. Conf. Dependability and Complex Systems DepCoS-RELCOMEX, Springer, 224, 431-438.
  • [13] Sugier, J. (2013). Low-cost hardware implementations of Salsa20 stream cipher in programmable devices. Journal of Polish Safety and Reliability Association 4, 1, 121-128.
  • [14] Sugier, J. (2014). Low cost FPGA devices in high speed implementations of Keccak-f hash algorithm. Advances in Intelligent and Soft computing: New Results in Dependability and thComplex Systems. Proc. 9 Int. Conf. Dependability and Complex Systems DepCoS-RELCOMEX, Springer, 286, 433-442.
  • [15] Xilinx, Inc. (2009). Spartan-3 Family Data Sheet. www.xilinx.com (ds099.pdf); retrieved March 2015.
  • [16] Xilinx, Inc. (2011). Spartan-6 Family Overview. www.xilinx.com (ds160.pdf); retrieved March 2015.
  • [17] Yan, J., & Heys, H. M. (2007). Hardware implementation of the Salsa20 and Phelix stream ciphers. Proc. Canadian Conference on Electrical and Computer Engineering CCECE 2007. IEEE, 1125-1128.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-792c0316-7e6d-4e4b-81fb-fc61e687ba97
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.