Efficient configurations for block ciphers with unified ENC/DEC paths
Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher,...
Uloženo v:
| Vydáno v: | 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) s. 41 - 46 |
|---|---|
| Hlavní autoři: | , , |
| Médium: | Konferenční příspěvek |
| Jazyk: | angličtina |
| Vydáno: |
IEEE
01.05.2017
|
| Témata: | |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined implementations of these ciphers. |
|---|---|
| AbstractList | Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined implementations of these ciphers. |
| Author | Bogdanov, Andrey Regazzoni, Francesco Banik, Subhadeep |
| Author_xml | – sequence: 1 givenname: Subhadeep surname: Banik fullname: Banik, Subhadeep email: bsubhadeep@ntu.edu.sg organization: Temasek Labs., Nanyang Technol. Univ., Singapore, Singapore – sequence: 2 givenname: Andrey surname: Bogdanov fullname: Bogdanov, Andrey email: anbog@dtu.dk organization: DTU Compute, Tech. Univ. of Denmark, Lyngby, Denmark – sequence: 3 givenname: Francesco surname: Regazzoni fullname: Regazzoni, Francesco email: regazzoni@alari.ch organization: ALaRI, USI, Lugano, Switzerland |
| BookMark | eNotj8tOwzAURI0EC9qyR2LjH0jqRx72EgVDK1VlQfaVY1-TK4oTOakQf08kuhiNdBajMytyG4cIhDxylnPO9Hb30eaC8TqvdcmX3JAVL6WqpBa6vifGhIAOIc7UDTHg5yXZGYc40TAk2p0H90Udjj2kif7g3NNLxIDgqTk22xfT0NHO_bQhd8GeJ3i49pq0r6Ztdtnh_W3fPB8y1GzOCs8qKwWXnXJdWTFVaVBKO201B-Z4DVVYqAURvOhcKUAqXyy2XkIhQcg1efqfRQA4jQm_bfo9XY_JPzngRsE |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/HST.2017.7951795 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library (IEL) (UW System Shared) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1538639297 9781538639290 |
| EndPage | 46 |
| ExternalDocumentID | 7951795 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i90t-4d06a3213b8cb560869e889c9a91e0c17e6f608ae2fd2bc52e38d4153d3e43e23 |
| IEDL.DBID | RIE |
| IngestDate | Thu Jun 29 18:37:58 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-4d06a3213b8cb560869e889c9a91e0c17e6f608ae2fd2bc52e38d4153d3e43e23 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_7951795 |
| PublicationCentury | 2000 |
| PublicationDate | 2017-May |
| PublicationDateYYYYMMDD | 2017-05-01 |
| PublicationDate_xml | – month: 05 year: 2017 text: 2017-May |
| PublicationDecade | 2010 |
| PublicationTitle | 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
| PublicationTitleAbbrev | HST |
| PublicationYear | 2017 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.6381024 |
| Snippet | Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 41 |
| SubjectTerms | Ciphers Computer architecture Encryption Energy consumption Logic gates Wires |
| Title | Efficient configurations for block ciphers with unified ENC/DEC paths |
| URI | https://ieeexplore.ieee.org/document/7951795 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5q8eBJpRXf5ODRbbdJdpOc65aeSsEeeit5TGQRttLt-vtNdmtF8OItDBlCZiAzmcc3AE8-p1YxzhLkMVpFDSZSO54IbyzLpESe6nbYhFgs5Hqtlj14PvbCIGJbfIajuGxz-W5rmxgqGwsVAaWyEzgRIu96tb4zj6kaz19XsVRLjA7bfs1Lac3F7Px_B13A8KfvjiyPFuUSelgNoChalIfAQMLf1ZdvTae0mgR_k5hgjN6JLSM6QE1iVJU0VemDY0mKxXT8UkxJHDpcD2E1K1bTeXIYfpCUKt0n3KW5ZnTCjLQmeCUyVyilskqrCaZ2IjD3gaqRekeNzSgy6YIxZo4hZ0jZFfSrbYXXQIR1OgvvmrVWcZ9KpdPAgcrr4N4hNzcwiBLYfHTwFpvD5W__Jt_BWRRyV_N3D_39rsEHOLWf-7LePbY6-QLrFpAa |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA9zCvqksonf5sFHu2VJ2ibPs2PiLAP7sLeRpBcpQifr6t9v0s6J4Itv4cgRcge5y338DqF7G1EjGWcBcB-tohoCoXIexFYbFgoBnKhm2EScpmKxkPMOetj1wgBAU3wGA79scvn5ytQ-VDaMpQeUCvfQfsg5JW231nfukcjh9DXzxVrxYLvx18SUxmBMjv931Anq_3Te4fnOppyiDpQ9lCQNzoNjwO73aou3ulVbhZ3HibUzR-_YFB4foMI-rorrsrDOtcRJOh4-JmPsxw5XfZRNkmw8DbbjD4JCkk3AcxIpRkdMC6OdXyIiCUJII5UcATGjGCLrqAqozak2IQUmcmeOWc6AM6DsDHXLVQnnCMcmV6F72YwxklsipCKOA6RVzsEDri9Qz0tg-dECXCy3l7_8m3yHDqfZy2w5e0qfr9CRF3hbAXiNupt1DTfowHxuimp92-jnC5nQk2E |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+IEEE+International+Symposium+on+Hardware+Oriented+Security+and+Trust+%28HOST%29&rft.atitle=Efficient+configurations+for+block+ciphers+with+unified+ENC%2FDEC+paths&rft.au=Banik%2C+Subhadeep&rft.au=Bogdanov%2C+Andrey&rft.au=Regazzoni%2C+Francesco&rft.date=2017-05-01&rft.pub=IEEE&rft.spage=41&rft.epage=46&rft_id=info:doi/10.1109%2FHST.2017.7951795&rft.externalDocID=7951795 |