AES-GCM and AEGIS: Efficient and High Speed Hardware Implementations

被引:0
|
作者
Karim M. Abdellatif
Roselyne Chotin-Avot
Habib Mehrez
机构
[1] Center of Microelectronics in Provence (CMP),
[2] LIP6-SoC Laboratory,undefined
[3] University of Paris VI,undefined
来源
关键词
Authenticated encryption; AES-GCM; AEGIS; FPGAs; GHASH; Karatsuba Ofman algorithm (KOA);
D O I
暂无
中图分类号
学科分类号
摘要
Authenticated Encryption (AE) is a block cipher mode of operation which provides confidentiality and integrity simultaneously. In terms of the hardware implementation, it produces smaller area compared to two separated algorithms. Therefore, it has become popular and a number of modes have been proposed. This paper presents two efficient hardware implementations for AE schemes, AES-GCM and AEGIS. In terms of AES-GCM, the performance of the system is always determined by the Galois Hash (GHASH) architecture because of the inherent computation feedback. This paper introduces an efficient method for implementing the pipelined Karatsuba Ofman Algorithm (KOA)-based GHASH on FPGAs. In particular, the computation feedback is removed by analyzing the complexity of the computation process. In addition, an efficient AEGIS is also implemented using only five AES rounds. The proposed architectures are evaluated with three different implementations of AES SubBytes (BRAMs-based SubBytes, composite field-based SubBytes, and LUT-based SubBytes) to increase the flexibility of the presented work. The presented architectures are implemented using Xilinx Virtex-5 FPGAs. Our comparison to previous work reveals that our architectures are more performance-efficient (Throughput/Slices).
引用
收藏
页码:1 / 12
页数:11
相关论文
共 50 条
  • [31] Power analysis resistant hardware implementations of AES
    Ordu, Levent
    Ors, Berna
    2007 14TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-4, 2007, : 1408 - +
  • [32] A Highly Parallel AES-GCM Core for Authenticated Encryption of 400 Gb/s Network Protocols
    Buhrow, Benjamin
    Fritz, Karl
    Gilbert, Barry
    Daniel, Erik
    2015 INTERNATIONAL CONFERENCE ON RECONFIGURABLE COMPUTING AND FPGAS (RECONFIG), 2015,
  • [33] Off-Chip Memory Encryption and Integrity Protection Based on AES-GCM in Embedded Systems
    Liu, Zhenglin
    Zhu, Qingchun
    Li, Dongfang
    Zou, Xuecheng
    IEEE DESIGN & TEST, 2013, 30 (05) : 54 - 62
  • [34] High-speed hardware implementations of the KASUMI block cipher
    Kitsos, P
    Galanis, MD
    Koufopavlou, O
    2004 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL 2, PROCEEDINGS, 2004, : 549 - 552
  • [35] High-speed hardware architectures for authenticated encryption mode GCM
    Satoh, Akashi
    2006 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11, PROCEEDINGS, 2006, : 4831 - 4834
  • [36] Hardware Efficient AES for Image Processing with High Throughput
    Delakoti, Neha
    Gaur, Nidhi
    Mehra, Anu
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 932 - 935
  • [37] Strengthening hardware AES implementations against fault attacks
    Joye, M.
    Manet, P.
    Rigaud, J. -B.
    IET INFORMATION SECURITY, 2007, 1 (03) : 106 - 110
  • [38] Efficient Implementations for AES Encryption and Decryption
    Rashmi Ramesh Rachh
    P. V. Ananda Mohan
    B. S. Anami
    Circuits, Systems, and Signal Processing, 2012, 31 : 1765 - 1785
  • [39] Comparison of Three CPU-Core Families for IoT Applications in Terms of Security and Performance of AES-GCM
    Sovyn, Yaroslav
    Khoma, Volodymyr
    Podpora, Michal
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) : 339 - 348
  • [40] Efficient Implementations for AES Encryption and Decryption
    Rachh, Rashmi Ramesh
    Mohan, P. V. Ananda
    Anami, B. S.
    CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2012, 31 (05) : 1765 - 1785