Fast Software implementation of the block cipher uBlock algorithm

被引:0
|
作者
Gao, Ying [1 ]
Wang, Longxin [1 ]
Tian, Lei [1 ]
Hu, Yang [1 ]
Zhang, Yupeng [1 ]
Yan, Yu [1 ]
Wu, Qianhong [1 ]
机构
[1] School of Cyber Science and Technology, Beihang University, Beijing,100191, China
来源
Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology | / 46卷 / 06期
关键词
Structural optimization;
D O I
10.11887/j.cn.202406010
中图分类号
学科分类号
摘要
To optimize ihe Software implementation of the domestic block cipher uBlock algorithm, the AVX2 Instruction set supporling 256 bil data widlh was implemented, ihe automatic optimization level of the Compiler was increased, optimizing the ealling process of functions, and the methods of data storage structure optimization, high-level parallelism and low laleney inslruction logie optimization were used in order to implemenl parallel Computing under the single-lhread condition. Using this efficient combination method, the speed of single key short message encryption of uBloek-128/128 algorithm, uBloek-128/256 algorithm and uBlock-256/256 algorithm are 269%, 182% and 49% higher lhan the original code. Based on these optimization methods, the implementation of single-key scenario and multi-key scenario are given for three algorithm versions of uBloek-128/128, uBlock-128/256 and uBlock-256/256. © 2024 National University of Defense Technology. All rights reserved.
引用
收藏
页码:96 / 106
相关论文
共 50 条
  • [41] Block Cipher and Stream Cipher Algorithm Performance Comparison in a Personal VPN Gateway
    Ismoyo, Dimas Dwiki
    Wardhani, Rini Wisnu
    2016 1ST INTERNATIONAL SEMINAR ON APPLICATION FOR TECHNOLOGY OF INFORMATION AND COMMUNICATION (ISEMANTIC): SCIENCE AND TECHNOLOGY FOR A BETTER FUTURE, 2016, : 207 - 210
  • [42] A Very Compact Hardware Implementation of the KASUMI Block Cipher
    Yamamoto, Dai
    Itoh, Kouichi
    Yajima, Jun
    INFORMATION SECURITY THEORY AND PRACTICES: SECURITY AND PRIVACY OF PERVASIVE SYSTEMS AND SMART DEVICES, 2010, 6033 : 293 - 307
  • [43] VLSI architecture design and implementation for TWOFISH block cipher
    Lai, YK
    Chen, LG
    Lai, JY
    Parng, TM
    2002 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL II, PROCEEDINGS, 2002, : 356 - 359
  • [44] Modular multiplication for FPGA implementation of the IDEA block cipher
    Beuchat, JL
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2003, : 412 - 422
  • [45] Joint hardware/software design of a fast stream cipher
    Clapp, CSK
    FAST SOFTWARE ENCRYPTION, 1998, 1372 : 75 - 92
  • [46] Fault detection on the software implementation of CLEFIA lightweight cipher
    School of Computer Science and Technology, Donghua University, Shanghai, China
    不详
    不详
    不详
    J. Netw., 2012, 8 (1288-1294):
  • [47] The Low Cost Threshold Implementation Method of uBlock Algorithm Against Side Channel Attacks
    Jiao Z.-P.
    Chen H.
    Yao F.
    Fan L.-M.
    Jisuanji Xuebao/Chinese Journal of Computers, 2023, 46 (03): : 657 - 670
  • [48] Optical implementation of cipher block chaining mode algorithm using phase-shifting digital holography
    Jeon, Seok-Hee
    Gil, Sang-Keun
    OPTICAL ENGINEERING, 2016, 55 (12)
  • [49] Study and VHDL implementation of a novel chaos-based block cipher algorithm for digital image security
    Hajjaji, Mohamed Ali
    Albouchi, Adnen
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (01)
  • [50] FaultMeter: Quantitative Fault Attack Assessment of Block Cipher Software
    Keerthi K.
    Rebeiro C.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2023, 2023 (02): : 212 - 240