Efficient configurations for block ciphers with unified ENC/DEC paths

Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher,...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) s. 41 - 46
Hlavní autoři: Banik, Subhadeep, Bogdanov, Andrey, Regazzoni, Francesco
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.05.2017
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined implementations of these ciphers.
AbstractList Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such architectures form critical building blocks for secure cryptographic implementations. Depending on the algebraic structure of a given cipher, there may be multiple ways of constructing the combined encryption/decryption circuit, each targeted at optimizing lightweight design metrics like area or power etc. In this paper we look at how the choice of circuit configuration affects the energy required to perform one encryption/decryption. We begin by analyzing 12 circuit configurations for the Advanced Encryption Standard (AES-128) cipher and establish some design rules for energy efficiency. We then extend our analysis to several lightweight block ciphers. In the second part of the paper we also investigate area optimized circuits for combined implementations of these ciphers.
Author Bogdanov, Andrey
Regazzoni, Francesco
Banik, Subhadeep
Author_xml – sequence: 1
  givenname: Subhadeep
  surname: Banik
  fullname: Banik, Subhadeep
  email: bsubhadeep@ntu.edu.sg
  organization: Temasek Labs., Nanyang Technol. Univ., Singapore, Singapore
– sequence: 2
  givenname: Andrey
  surname: Bogdanov
  fullname: Bogdanov, Andrey
  email: anbog@dtu.dk
  organization: DTU Compute, Tech. Univ. of Denmark, Lyngby, Denmark
– sequence: 3
  givenname: Francesco
  surname: Regazzoni
  fullname: Regazzoni, Francesco
  email: regazzoni@alari.ch
  organization: ALaRI, USI, Lugano, Switzerland
BookMark eNotj8tOwzAURI0EC9qyR2LjH0jqRx72EgVDK1VlQfaVY1-TK4oTOakQf08kuhiNdBajMytyG4cIhDxylnPO9Hb30eaC8TqvdcmX3JAVL6WqpBa6vifGhIAOIc7UDTHg5yXZGYc40TAk2p0H90Udjj2kif7g3NNLxIDgqTk22xfT0NHO_bQhd8GeJ3i49pq0r6Ztdtnh_W3fPB8y1GzOCs8qKwWXnXJdWTFVaVBKO201B-Z4DVVYqAURvOhcKUAqXyy2XkIhQcg1efqfRQA4jQm_bfo9XY_JPzngRsE
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/HST.2017.7951795
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library (IEL) (UW System Shared)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1538639297
9781538639290
EndPage 46
ExternalDocumentID 7951795
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-4d06a3213b8cb560869e889c9a91e0c17e6f608ae2fd2bc52e38d4153d3e43e23
IEDL.DBID RIE
IngestDate Thu Jun 29 18:37:58 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-4d06a3213b8cb560869e889c9a91e0c17e6f608ae2fd2bc52e38d4153d3e43e23
PageCount 6
ParticipantIDs ieee_primary_7951795
PublicationCentury 2000
PublicationDate 2017-May
PublicationDateYYYYMMDD 2017-05-01
PublicationDate_xml – month: 05
  year: 2017
  text: 2017-May
PublicationDecade 2010
PublicationTitle 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
PublicationTitleAbbrev HST
PublicationYear 2017
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6381024
Snippet Block Ciphers providing the combined functionalities of encryption and decryption are required to operate in modes of operation like CBC and ELmD. Hence such...
SourceID ieee
SourceType Publisher
StartPage 41
SubjectTerms Ciphers
Computer architecture
Encryption
Energy consumption
Logic gates
Wires
Title Efficient configurations for block ciphers with unified ENC/DEC paths
URI https://ieeexplore.ieee.org/document/7951795
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5q8eBJpRXf5ODRbbdJdpOc65aeSsEeeit5TGQRttLt-vtNdmtF8OItDBlCZiAzmcc3AE8-p1YxzhLkMVpFDSZSO54IbyzLpESe6nbYhFgs5Hqtlj14PvbCIGJbfIajuGxz-W5rmxgqGwsVAaWyEzgRIu96tb4zj6kaz19XsVRLjA7bfs1Lac3F7Px_B13A8KfvjiyPFuUSelgNoChalIfAQMLf1ZdvTae0mgR_k5hgjN6JLSM6QE1iVJU0VemDY0mKxXT8UkxJHDpcD2E1K1bTeXIYfpCUKt0n3KW5ZnTCjLQmeCUyVyilskqrCaZ2IjD3gaqRekeNzSgy6YIxZo4hZ0jZFfSrbYXXQIR1OgvvmrVWcZ9KpdPAgcrr4N4hNzcwiBLYfHTwFpvD5W__Jt_BWRRyV_N3D_39rsEHOLWf-7LePbY6-QLrFpAa
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3dS8MwEA9zCvqksonf5sFHu2VJ2ibPs2PiLAP7sLeRpBcpQifr6t9v0s6J4Itv4cgRcge5y338DqF7G1EjGWcBcB-tohoCoXIexFYbFgoBnKhm2EScpmKxkPMOetj1wgBAU3wGA79scvn5ytQ-VDaMpQeUCvfQfsg5JW231nfukcjh9DXzxVrxYLvx18SUxmBMjv931Anq_3Te4fnOppyiDpQ9lCQNzoNjwO73aou3ulVbhZ3HibUzR-_YFB4foMI-rorrsrDOtcRJOh4-JmPsxw5XfZRNkmw8DbbjD4JCkk3AcxIpRkdMC6OdXyIiCUJII5UcATGjGCLrqAqozak2IQUmcmeOWc6AM6DsDHXLVQnnCMcmV6F72YwxklsipCKOA6RVzsEDri9Qz0tg-dECXCy3l7_8m3yHDqfZy2w5e0qfr9CRF3hbAXiNupt1DTfowHxuimp92-jnC5nQk2E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2017+IEEE+International+Symposium+on+Hardware+Oriented+Security+and+Trust+%28HOST%29&rft.atitle=Efficient+configurations+for+block+ciphers+with+unified+ENC%2FDEC+paths&rft.au=Banik%2C+Subhadeep&rft.au=Bogdanov%2C+Andrey&rft.au=Regazzoni%2C+Francesco&rft.date=2017-05-01&rft.pub=IEEE&rft.spage=41&rft.epage=46&rft_id=info:doi/10.1109%2FHST.2017.7951795&rft.externalDocID=7951795