AES-GCM and AEGIS: Efficient and High Speed Hardware Implementations

被引:0
|
作者
Karim M. Abdellatif
Roselyne Chotin-Avot
Habib Mehrez
机构
[1] Center of Microelectronics in Provence (CMP),
[2] LIP6-SoC Laboratory,undefined
[3] University of Paris VI,undefined
来源
关键词
Authenticated encryption; AES-GCM; AEGIS; FPGAs; GHASH; Karatsuba Ofman algorithm (KOA);
D O I
暂无
中图分类号
学科分类号
摘要
Authenticated Encryption (AE) is a block cipher mode of operation which provides confidentiality and integrity simultaneously. In terms of the hardware implementation, it produces smaller area compared to two separated algorithms. Therefore, it has become popular and a number of modes have been proposed. This paper presents two efficient hardware implementations for AE schemes, AES-GCM and AEGIS. In terms of AES-GCM, the performance of the system is always determined by the Galois Hash (GHASH) architecture because of the inherent computation feedback. This paper introduces an efficient method for implementing the pipelined Karatsuba Ofman Algorithm (KOA)-based GHASH on FPGAs. In particular, the computation feedback is removed by analyzing the complexity of the computation process. In addition, an efficient AEGIS is also implemented using only five AES rounds. The proposed architectures are evaluated with three different implementations of AES SubBytes (BRAMs-based SubBytes, composite field-based SubBytes, and LUT-based SubBytes) to increase the flexibility of the presented work. The presented architectures are implemented using Xilinx Virtex-5 FPGAs. Our comparison to previous work reveals that our architectures are more performance-efficient (Throughput/Slices).
引用
收藏
页码:1 / 12
页数:11
相关论文
共 50 条
  • [21] An AES-GCM Authenticated Encryption Crypto-Core for IoT Security
    Sung, Byung-Yoon
    Kim, Ki-Bbeum
    Shin, Kyung-Wook
    2018 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATION (ICEIC), 2018, : 285 - 287
  • [22] Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems
    Hori, Yohei
    Satoh, Akashi
    Sakane, Hirofumi
    Toda, Kenji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2008, 5312 : 261 - 278
  • [23] Efficient Off-chip Memory Protection Mechanism for Embedded Computing Systems using AES-GCM
    Lu, Zhaojun
    Xing, Xiaoliang
    Tong, Qiaoling
    Liu, Zhenglin
    2015 14TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN AND COMPUTER GRAPHICS (CAD/GRAPHICS), 2015, : 236 - 237
  • [24] FPGA implementation and comparison of AES-GCM and Deoxys Authenticated Encryption schemes
    Koteshwara, Sandhya
    Das, Amitabh
    Parhi, Keshab K.
    2017 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2017, : 356 - 359
  • [25] Side-Channel Analysis of Multiplications in GF(2128) Application to AES-GCM
    Belaid, Sonia
    Fouque, Pierre-Alain
    Gerard, Beneit
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 2014, 8874 : 306 - 325
  • [26] PAGE-Practical AES-GCM Encryption for Low-End Microcontrollers
    Kim, Kyungho
    Choi, Seungju
    Kwon, Hyeokdong
    Kim, Hyunjun
    Liu, Zhe
    Seo, Hwajeong
    APPLIED SCIENCES-BASEL, 2020, 10 (09):
  • [27] The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
    Bellare, Mihir
    Tackmann, Bjorn
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 247 - 276
  • [28] Hardware implementations of high-speed network monitors
    Tanba, H
    Yamada, Y
    Kitamichi, J
    Kurda, K
    2005 IEEE VLSI-TSA International Symposium on VLSI Design, Automation & Test (VLSI-TSA-DAT), Proceedings of Technical Papers, 2005, : 33 - 36
  • [29] Practical fault resilient hardware implementations of AES
    Sheikhpour, Saeide
    Mahani, Ali
    Bagheri, Nasour
    IET CIRCUITS DEVICES & SYSTEMS, 2019, 13 (05) : 596 - 606
  • [30] Successfully attacking masked AES hardware implementations
    Mangard, S
    Pramstaller, N
    Oswald, E
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2005, PROCEEDINGS, 2005, 3659 : 157 - 171