Parallel and Pipeline Processing for Block Cipher Algorithms on a Network-on-Chip

Size: px
Start display at page:

Download "Parallel and Pipeline Processing for Block Cipher Algorithms on a Network-on-Chip"

Transcription

1 Parallel and Pipeline Processing for Block Cipher Algorithms on a Network-on-Chip Yoon Seok Yang, Jun Ho Bahn, Seung Eun Lee, and Nader Bagherzadeh Department of Electrical Engineering and Computer Science University of California, Irvine Irvine, California, , USA {yangys, jbahn, seunglee, nader}@uci.edu Abstract The computational performance of Network-on-Chip (NoC) and Multi-Processor System-on-Chip (MPSoC) for implementing cryptographic block ciphers can be improved by exploiting parallel and pipeline execution. In this paper, we present a parallel and pipeline processing method for block cipher algorithms: Encryption Standard (), Triple- Algorithm (), and Advanced Encryption Standard () based on pure software implementation on an NoC. The algorithms are decomposed into task loops, functions, and data flow for parallel and pipeline execution. The tasks are allocated by the proposed mapping strategy to each Processing Element (PE) which consists of a 3- bit Reduced Instruction Set Computer (RISC) core, internal memory, router, and Network Interface (NI) to communicate between PEs. The proposed approach is simulated by using Networked Processor Array (NePA), the cycle-accurate SystemC and Hardware Description Language (HDL) model platform. We show that our method has the advantage of flexibility as compared to previous implementations of cryptographic algorithms based on hardware and software co-design or traditional hardwired ASIC design. In addition, the simulation result presents that the parallel and pipeline processing approach for software block ciphers can be implemented on various NoC platforms which have different complexities and constraints. Key Words: security, block cipher, network-on-chip, parallel and pipeline processing, software implementation 1. Introduction As algorithms have become more complex and diverse, hardware IPs or SoCs which consist of devices such as CPU, DSP, memory, and co-processing components are used to implement them. In order to run a block cryptographic algorithm which is one of the computational intensive applications, a dedicated hardware design is used to execute the algorithm rapidly and effectively. However, a hardware implementation has disadvantages in flexibility and compatibility in contrast with a software implementation. One of the ways to maximize flexibility and computational power is using a multi-core platform such as MPSoC and NoC. This approach has problems in software scheduling and partitioning for application-level parallelism which increases overall performance effectively. In this paper, a parallel and pipeline execution methodology for a software block cipher is implemented on NePA NoC platform [6] which has a general NoC architecture without specialized hardware logics typically used in traditional ASIC design for a block cipher. The proposed method supports task concurrency, balanced task distribution, and high flexibility for the NoC environment. Since this method adopts software block ciphers, it can decrease time-to-market and turn-around time to implement various cryptographic algorithms. The main contributions of this paper are as: A software approach for block cipher algorithms on an NoC platform. Detailed modeling the approach based on SystemC and HDL level hardware platform. The organization of this paper is as follows: Section provides the related work about the implementation of block cipher algorithms on various systems. Section 3 introduces the parallel and pipeline processing method for block ciphers on NePA. Section 4 describes the implementation. Section 5 presents the experimental results. Section 6, summarizes and concludes this paper.

2 . Related work Several implementation methods for block cipher algorithms have been proposed. One of the methods is fully hardwired or an FPGA implementation of the block cipher algorithms [16], [1]. Another method is mixing DSP/RISC and dedicated hardware such as co-processing blocks, or inserting special instructions to improve not only flexibility but also computing power for calculation of cryptographic functions. For the improvement of overall performance, dedicated and specialized cryptographic hardware modules are used with DSP or RISC processors [11], [15]. Other researchers have proposed specialized instruction set architectures to accelerate cipher algorithms on hardware and software co-design platforms [9], [7], [13]. The third method is using MPSoC, NP (Network Processor), or NoC platform which has a multi-core processing architecture. The authors of [8] have suggested maximizing the throughput of a pipelined multiprocessor system by effective assignment of flow tasks to pipeline stages on an NP platform. In the paper [14], they have introduced a methodology for profiling and scheduling networking workloads and applications on a highly parallel network processor architecture. In their papers [16], [9], [8], [14], they have shown various parallel and pipeline task scheduling and mapping methodologies for block cipher algorithms. The proposed parallel and pipeline NoC implementation for block ciphers have been developed on their platforms. 3. Networked Processor Array (NePA) NoC Platform system which is a mesh-based multi-processor SoC is proposed as shown in Figure 1. This reconfigurable multiprocessor platform includes multiple RISC processors, memory blocks, and several specific IPs. Each PE has a CompactOR, internal data/instruction memory, a generic network interface, and a router adopting both a normal routing algorithm and an adaptive routing algorithm. Open- RISC core [1], one of open core processors, is used as the main processor of the NePA platform. In addition, generic network interface (NI) blocks and routing units [10], [5] are integrated to the NePA platform for a mesh-based network. The routers allow to transport not only application data but also control data between PEs by a memory mapped interface protocol. Each PE executes a part of block cipher functions by the parallel and pipeline execution method on the platform without dedicated cryptographic co-processor modules or hardwired logics. NePA router has a -port north/south and 1-port west/east interfaces to interconnect between PEs on the D meshed network. One of the main purposes of this research is to improve the computational performance of block ciphers by incorporating an NoC architecture. To achieve this goal, NePA is designed in SystemC as well as in Verilog HDL to simulate and verify the performance of the proposed parallel and pipeline processing method for block ciphers. Moreover, a set of tool chain is provided. 4. Parallel and pipeline processing for block ciphers 4.1. Overview of block cipher algorithms 8X8 NoC platform Processing Element Instruction Memory 3-bit 64-bit Code Code 3-bit Compact Memory OR 3-bit 64-bit 3-bit Register values Block Control Unit Network Interface Register PE Router Figure 1. Target NePA NoC platform based on 8x8 mesh network. In order to meet the high-performance and low-power requirements, a scalable, flexible, and reconfigurable multiprocessor platform, Networked Processor Array (NePA) PE PE Block cipher algorithms use symmetric and secret keys to encrypt and decrypt a plaintext composed of fixed-length block data with mathematical transformations. Each plaintext block is the same length as all of the other input blocks, for example 64 or 18 bits. In the operation of a block cipher, a ciphertext is encrypted by using a plaintext and a key block. The benefit of block ciphers is diffusion where bits are spread throughout the ciphertext such that a change of single bit in either the key or the plaintext causes a significant change in the ciphertext. The disadvantage is that algorithms take a long time to produce a ciphertext, compared to stream ciphers, and single bit error can be propagated to an entire block. Encryption Standard ( []), Triple- Algorithm ( [3]), and Advanced Encryption Standard ( [4]) are widely used in symmetric cryptography standard algorithms released by the National Institute Standard and Technology (NIST).

3 Instruction level Determination of concurrent and sequential tasks Block cipher algorithms (C code) Profiling Sequential tasks Concurrent tasks Scheduling and mapping tasks on NoCs x x 4 3 x 3 4 x 4 Number of PEs Pipeline depths pipelined PEs 4 pipelined PEs 8 pipelined PEs Group1 Group3 Group4 Pipelined PE groups Group Group5 Run tasks on the desired NoC Processing Element (PE) 8 x 8 16 pipelined PEs Figure. The procedure of the proposed parallel and pipeline processing for block ciphers 4.. Methodology of parallel and pipeline processing for block ciphers Figure illustrates the main steps of the proposed parallel and pipeline processing method for block ciphers on NePA. This approach starts at profiling block cipher algorithms written in C. The aim of the profile is to classify execution groups which can be performed concurrently or sequentially in instruction, function, and round (a group of iterative functions defined in each block cipher algorithm) level. Guided by the profiling results, the groups of functions and rounds are determined, which are assigned and run as parallel and pipeline tasks in a PE. In [14], the authors use an annotated directed acyclic graph (ADAG) to generate a group of pipelined tasks by the dynamic profiling and instruction tracing method. While in this paper profiling, grouping, and allocating tasks are carried out manually considering the overall performance of the NePA system and the workload which is scheduled to PEs. As another issue in the proposed implementation, a scheduling and mapping procedure is suggested to assign the tasks to PEs. The scheduling and mapping step is obviously one of the key factors to execute the partitioned block cipher programs on NePA. It is performed by the information based on the organization of the concurrent and sequential tasks generated from the profiling step. Furthermore, the scheduling and mapping procedure depends on additional information like the number of PEs, pipeline depth, and pipelined PE groups. In summary, the method is performed in four steps as follows: 1. Profiling block cipher algorithms In the first step, the block ciphers programmed in C language are profiled as function-level and roundlevel lists to extract sequential and concurrent features. In profiling, there are instruction-level, function-level, and round-level profiling methods.,, and block ciphers are profiled into function-level and round-level modules except instruction-level in order to exploit high level profiling approach instead of bottom level instruction profiling approach.. Determination of concurrent and sequential tasks In the second step, the profiled groups of functions and iteration rounds are used to determine sequential and concurrent tasks. The profiled tasks in the previous step are classified according to sequential and concurrent features of the tasks to schedule and map them into PEs. For instance, round tasks are processed in a sequential order, therefore each round task can be regarded as an element of sequential tasks. 3. Scheduling and mapping tasks on NoC platforms In the third step, the tasks classified into sequential and concurrent tasks are scheduled and mapped into PEs on NePA. Following parameters are required in order to define the scheduling and mapping tasks on NePA. the number of PEs the number of pipeline depths the number of pipelined PE groups

4 Profiling Determination of concurrent and sequential tasks Funtion level IP E K S P IV IP PC PC RL 1 Encrypt Decrypt AR K MC BS KE SR KS G4 IP E K S P G PC PC RL 1 IV IP Encrypt ~ Decrypt ~ Encrypt ~ AR K BS SR MC G4 G KE KS Round level IR Rounds IR BR FR 4 4 G-8 BR BR Notation : Group and #rounds = 1 BR G- : G and #rounds = 14 Rounds FR BR BR BR IR 8 Rounds BR BR BR BR G-4 : G and #rounds = 4 14 X 3 Rounds Scheduling and Mapping (Example : 4x4 NoC) G G PE-4,, G- G- G- G- G- G- G G PE-4, G-5 G-5, G-6, G-4, G-6, G-4 G-6 G-6 G4 G G G4, G G PE-3,, G- G- G- G- G- G- G G PE-3, G-5, G-5, G-6, G-4, G-6, G-4 G-6 G-6 PE-3 G G4 PE-4 G4 G,, Figure 3. The implementation of,, and by the proposed methodology on 4x4 NePA NePA is differently configured by the number of PEs. For example, x NePA platform has four PEs and 8x8 platform has 64 PEs. In this scheduling and mapping step, one of the PEs is selected as the first PE which is in charge of a main control PE. And then one of the neighbor PEs which has the shortest-distance from the current PE is adopted as a next PE to build parallel and pipelined PE groups. Therefore, the nearest PE from current PE is selected as a next PE in order to schedule and map a task to the PE. This method allows reduction of communication. 4. Execution of the tasks In the last step, the tasks mapped and scheduled in the PEs are executed in the parallel and pipelined way Implementation of block ciphers by the proposed methodology In this section, the block cryptographic algorithms are implemented by the proposed method. As shown in Figure 3, the profiled functions, the groups of functions, the groups of rounds, and the compositions of parallel and pipelined tasks are outlined for the scheduling and mapping step on 4x4 mesh-based NePA system Profiling block ciphers on NePA. Table 1 illustrates profiled components of block ciphers. is composed of 9 functions, Initial Permutation (IP), Expansion Permutation (E), Key Schedule (K), Substitution Box (S), Permutation Box (P), Inverse Initial Permutation (IVIP), Permuta- Ciphers Ciphers F unctions IP, E, K, S, P, IVIP, PC1, RL, PC functions ARK, BS, SR, MC, KE, KS Rounds 1 IR, 14 BRs, 1 FR 3 IRs, 14 BRs, 3 FRs 1 IR, 8 BRs, 1 FR Table 1. The profiled result of,, and tion Choice-1 (PC1), Right/Left shift (RL), and Permutation Choice- (PC) in function-level decomposition. has the same element functions of because utilizes cipher three times in an Encrypt-Decrypt-Encrypt order. is organized into 6 functions such as Add Round Key (ARK), Byte Substitution (BS), Shift Row (SR), Mix Columne (MC), Key Expansion (KE), and Key Selection (KS). Rounds are classified into Initial Round (IR), Body Round (BR), and Front Round (FR) as the components of the round-level parallelism for, TEDA, and block cipher Determination of concurrent and sequential tasks. After profiling the block ciphers, the constitution of the concurrent and sequential tasks are determined in both function-level and round-level. For the implementation in function-level, G is grouped with PC1, RL, and

5 PC as the key scheduling module. is composed of E and K, and G4 has S and P. The goal of this step is to find the relationship among the groups of tasks such that,, and are processed sequentially, but G is executed concurrently. composed of encryption and decryption functions uses the same groups of. has 4 groups,, G,, and G4. G is grouped with KE and KS, includes BS and SR.,, and G4 are executed in a sequential order, but G is processed concurrently. For the determination of the concurrent and sequential tasks in round-level, different three round groups,, G, and are used for several block ciphers. The first group () executes the routine of the initial round. The second group (G) is annotated by the number of body rounds. For instance, G-3 means that it belongs in the second group and has three body rounds. The last group () executes the final round to generate encrypted output data Scheduling and mapping tasks on NePA. In this scheduling and mapping stage, the groups determined from the previous step are allocated to PEs along with supplemental information such as the number of PEs, pipeline depth, and the number of PE groups. Figure 3 illustrates an example of the implementation on a 4x4 NePA, composed of 16 PEs. In this example, has 4 concurrent PE groups (,,PE-3,PE-4) and each PE group consists of 3 pipeline depth ( ) with concurrent key scheduling task (G) in function-level. In roundlevel processing, has PE groups (,) and each PE group has 8 pipeline depth (, G- G- G- G- G- G-,). The PEs of a PE group are executed by a pipelined sequence, thus, the PE groups are run concurrently. is scheduled and mapped the same as implementation in function-level. In round-level, consists of 48 rounds (3x,4xG,3x) for each PE group. encryption and decryption are described by 4 PE groups (,,PE-3,PE-4) composed of 4 pipelined PEs in a group for function-level processing. In round-level processing, is composed of PE groups (, ). is utilized for the simulation, and the router model used in this system is the same as [5]. 5.. Simulation Results Figure 4, 5, 6, 7 illustrate the result of the simulation on NePA. In order to determine the complexity of communication on NePA, the amount of transferred bytes between PEs in function and round level is determined as Equation (1), (). #Pipelines is the number of pipelined PEs in a PE group, #Parallels is the number of parallel PE groups, and #Rounds is the number of rounds corresponding to the block ciphers. 9.E+07 8.E+07 7.E+07 6.E+07 4.E+07 3.E+07.E+07 1.E+07 1.E+08 T ranbytes f = (#P ipelines #Rounds 1) #P arallels #InputBytes (1) T ranbytes r = (#P ipelines 1) #P arallels #InputBytes () 8.E+05 6.E+05 4.E+05.E+05 Speed up Figure 4., transfer bytes, and speedup in simulation. Speed up Figure 5., transfer bytes, and speedup in simulation. 5. Experimental results 5.1. Simulation Environment The proposed methodology is simulated and implemented on a cycle-accurate SystemC and HDL NoC environment called NePA. The platform is composed of a number of Compact OpenRISC processors, network interface modules, and routers. The C codes programmed for parallel and pipelined execution on several PEs are compiled by OpenRISC tool chains. 100 MHz operating clock frequency 5.E+06 7.E+05 6.E+05 4.E+05 3.E+05.E+05 1.E+05 Speed up Figure 6., transfer bytes, and speedup in simulation.

6 1.E+08 1.E+08 (a) in function-level and round-level 7.E+04 6.E+04 5.E+04 4.E+04 3.E+04.E+04 1.E+04,, (b) Transfer Bytes in function-level and round-level Figure 7. Comparison of cycle counts and transfer bytes for block ciphers on NePA 6. Conclusions In this paper, a parallel and pipeline processing method has been presented to implement block cipher algorithms such as,, and through profiling, scheduling, and mapping exploration on an NoC platform called NePA. The method is used for the pure software implementation of block ciphers on NePA. The parallelized and pipelined tasks are allocated by the proposed mapping strategy to each PE which consists of 3-bit OpenRISC core, internal memory, router, and NI on the NePA platform. This proposed method has been developed and simulated by using the cycle-accurate SystemC and HDL description model. Using the cycle-accurate simulation, the simulation results show that the proposed method can be implemented on an NoC system effectively. References [1] Openrisc 100 core. projects.cgi/web/or1k/openrisc_100. [] encryption standard (). Technical Report Federal Information Processing Standard (FIPS) 46, National Bureau of Standards, [3] Triple data encryption algorithm (, a.k.a. Triple ). Technical Report Federal Information Processing Standard Publication 46-3, the standard ANSI X , NIST, [4] Advanced encryption standard (). Technical Report Federal Information Processing Standards Publications (FIPS PUBS) 197, Available from [5] J. H. Bahn, S. E. Lee, and N. Bagherzadeh. On design and analysis of a feasible network-on-chip (noc) architecture. In Proceedings of International Conference on Information Technology (ITNG 07), pages , 007. [6] J. H. Bahn, S. E. Lee, Y. S. Yang, J. S. Yang, and N. Bagherzadeh. Multi-processor system platform using network-on-chip (NoC) techniques. Parallel Processing Letters, World Scientific Publishing Company, 008. [7] A. M. Fiskiran and R. B. Lee. On-chip lookup tables for fast symmetric-key encryption. In Proceedings of the 005 IEEE International Conference on Application-Specific Systems, Architecture Processors (ASAP 05), pages , 005. [8] M. A. Franklin and S. r. Pipeline task scheduling on network processors. In Proceedings of 3rd Workshop on Network Processors and Applications - NP3(Madrid, Spain), February 004. [9] M. Fujita, S. Komatsu, H. Saito, K. Seto, T. Sakunkonchak, and Y. Kojima. Field modifiable architecture with FP- GAs and its design/verification/debugging methodologies. In Proceedings of 36th Annual Hawaii International Conference on System Sciences, page 79, 003. [10] S. E. Lee, J. H. Bahn, and N. Bagherzadeh. Design of a feasible on-chip interconnection network for a chip multiprocessor (CMP). In Proceedings of 19th International Symposium on Computer, Architecture and High Performance Computing (SBAC-PAD 007), 007. [11] P. Schaumont, K. Sakiyama, A. Hodjat,, and I. Verbauwhede. Embedded software integration for coarse-grain reconfigurable systems. In Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 04), pages IEEE Computer Society Press, 004. [1] E. Swankoski, R. Brooks, V. Narayanan, M. Kandemir, and M. Irwin. A parallel architecture for secure FPGA symmetric encryption. In Proceedings of RAW 004, January 004. [13] S. Tillich and J. Groscha. Instruction set extensions for efficient implementation on 3-bit processors. In Cryptographic Hardware and Embedded Systems (CHES 006), LNCS Vol. 449:70 84, 006. [14] N. Weng and T. Wolf. Profiling and mapping of parallel workloads on network processors. In Proceedings of The 0th Annual ACM Symposium on Applied Computing (SAC), pages , March 005. [15] L. Wu, C. Weaver, and T. Austin. CryptoManiac : A fast flexible architecture for secure communication. In Proceedings of Annual Int. Symposium on Computer Architecture (ISCA), pages , 001. [16] J. Zambreno, D. Nguyen, and A. Choudhary. Exploring area/delay tradeoffs in an FPGA implementation. In Proceedings of FPL 004, volume LNCS Vol. 303, pages , 004.

An Instruction Set Extension for Fast and Memory- Efficient AES Implementation. Stefan Tillich, Johann Großschädl, Alexander Szekely

An Instruction Set Extension for Fast and Memory- Efficient AES Implementation. Stefan Tillich, Johann Großschädl, Alexander Szekely Institute for Applied Information Processing and Communications () GRAZ UNIVERSITY OF TECHNOLOGY An Instruction Set Extension for Fast and Memory- Efficient AES Implementation Stefan Tillich, Johann Großschädl,

More information

Bus Matrix Synthesis Based On Steiner Graphs for Power Efficient System on Chip Communications

Bus Matrix Synthesis Based On Steiner Graphs for Power Efficient System on Chip Communications Bus Matrix Synthesis Based On Steiner Graphs for Power Efficient System on Chip Communications M.Jasmin Assistant Professor, Department Of ECE, Bharath University, Chennai,India ABSTRACT: Power consumption

More information

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái

Cryptography and Network Security Block Ciphers + DES. Lectured by Nguyễn Đức Thái Cryptography and Network Security Block Ciphers + DES Lectured by Nguyễn Đức Thái Outline Block Cipher Principles Feistel Ciphers The Data Encryption Standard (DES) (Contents can be found in Chapter 3,

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Interfacing a High Speed Crypto Accelerator to an Embedded CPU

Interfacing a High Speed Crypto Accelerator to an Embedded CPU Interfacing a High Speed Crypto Accelerator to an Embedded CPU Alireza Hodjat ahodjat @ee.ucla.edu Electrical Engineering Department University of California, Los Angeles Ingrid Verbauwhede ingrid @ee.ucla.edu

More information

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34

Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Secret Key Algorithms (DES) Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used for both encryption and decryption.

More information

Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures

Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures Design of an Efficient Architecture for Advanced Encryption Standard Algorithm Using Systolic Structures 1 Suresh Sharma, 2 T S B Sudarshan 1 Student, Computer Science & Engineering, IIT, Khragpur 2 Assistant

More information

Secret Key Algorithms (DES)

Secret Key Algorithms (DES) Secret Key Algorithms (DES) G. Bertoni L. Breveglieri Foundations of Cryptography - Secret Key pp. 1 / 34 Definition a symmetric key cryptographic algorithm is characterized by having the same key used

More information

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed

FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed FPGA Implementation of High Speed AES Algorithm for Improving The System Computing Speed Vijaya Kumar. B.1 #1, T. Thammi Reddy.2 #2 #1. Dept of Electronics and Communication, G.P.R.Engineering College,

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography 1 Block Cipher Scheme Encrypt Plaintext block of length N Decrypt Secret key Cipher block of length N 2 Generic Block Encryption Convert a plaintext block into an encrypted block:

More information

Exploring Area/Delay Tradeoffs in an AES FPGA Implementation

Exploring Area/Delay Tradeoffs in an AES FPGA Implementation Exploring Area/Delay Tradeoffs in an AES FPGA Implementation Joseph Zambreno, David Nguyen, and Alok Choudhary Department of Electrical and Computer Engineering Northwestern University Evanston, IL 60208,

More information

P V Sriniwas Shastry et al, Int.J.Computer Technology & Applications,Vol 5 (1),

P V Sriniwas Shastry et al, Int.J.Computer Technology & Applications,Vol 5 (1), On-The-Fly AES Key Expansion For All Key Sizes on ASIC P.V.Sriniwas Shastry 1, M. S. Sutaone 2, 1 Cummins College of Engineering for Women, Pune, 2 College of Engineering, Pune pvs.shastry@cumminscollege.in

More information

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 128 Bit ECB-AES Crypto Core Design using Rijndeal Algorithm for Secure Communication

More information

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT

VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH THE EFFICIENT MULTIPLICATIVE INVERSE UNIT K.Sandyarani 1 and P. Nirmal Kumar 2 1 Research Scholar, Department of ECE, Sathyabama

More information

FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL

FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL FPGA Based Implementation of AES Encryption and Decryption with Verilog HDL Y.Aruna 1, Prof.S.N.Shelke 2 M.Tech (Electronics), JDCOE, Nagpur. Abstract: Security is the most important part in data communication

More information

Design of a router for network-on-chip. Jun Ho Bahn,* Seung Eun Lee and Nader Bagherzadeh

Design of a router for network-on-chip. Jun Ho Bahn,* Seung Eun Lee and Nader Bagherzadeh 98 Int. J. High Performance Systems Architecture, Vol. 1, No. 2, 27 Design of a router for network-on-chip Jun Ho Bahn,* Seung Eun Lee and Nader Bagherzadeh Department of Electrical Engineering and Computer

More information

Speeding Up AES By Extending a 32 bit Processor Instruction Set

Speeding Up AES By Extending a 32 bit Processor Instruction Set Speeding Up AES By Extending a bit Processor Instruction Set Guido Marco Bertoni ST Microelectronics Agrate Briaznza, Italy bertoni@st.com Luca Breveglieri Politecnico di Milano Milano, Italy breveglieri@elet.polimi.it

More information

Chapter 3 Block Ciphers and the Data Encryption Standard

Chapter 3 Block Ciphers and the Data Encryption Standard Chapter 3 Block Ciphers and the Data Encryption Standard Last Chapter have considered: terminology classical cipher techniques substitution ciphers cryptanalysis using letter frequencies transposition

More information

Introduction to Modern Symmetric-Key Ciphers

Introduction to Modern Symmetric-Key Ciphers Introduction to Modern Symmetric-Key Ciphers 1 Objectives Review a short history of DES. Define the basic structure of DES. List DES alternatives. Introduce the basic structure of AES. 2 Data Encryption

More information

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. Symmetric Key Algorithms Definition A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. 1 Block cipher and stream cipher There are two main families

More information

Computational Security, Stream and Block Cipher Functions

Computational Security, Stream and Block Cipher Functions Computational Security, Stream and Block Cipher Functions 18 March 2019 Lecture 3 Most Slides Credits: Steve Zdancewic (UPenn) 18 March 2019 SE 425: Communication and Information Security 1 Topics for

More information

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography

Block Ciphers and Data Encryption Standard. CSS Security and Cryptography Block Ciphers and Data Encryption Standard CSS 322 - Security and Cryptography Contents Block Cipher Principles Feistel Structure for Block Ciphers DES Simplified DES Real DES DES Design Issues CSS 322

More information

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard

Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Introduction to Network Security Missouri S&T University CPE 5420 Data Encryption Standard Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of

More information

AES Core Specification. Author: Homer Hsing

AES Core Specification. Author: Homer Hsing AES Core Specification Author: Homer Hsing homer.hsing@gmail.com Rev. 0.1.1 October 30, 2012 This page has been intentionally left blank. www.opencores.org Rev 0.1.1 ii Revision History Rev. Date Author

More information

Deadlock-free XY-YX router for on-chip interconnection network

Deadlock-free XY-YX router for on-chip interconnection network LETTER IEICE Electronics Express, Vol.10, No.20, 1 5 Deadlock-free XY-YX router for on-chip interconnection network Yeong Seob Jeong and Seung Eun Lee a) Dept of Electronic Engineering Seoul National Univ

More information

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm

FPGA Can be Implemented Using Advanced Encryption Standard Algorithm FPGA Can be Implemented Using Advanced Encryption Standard Algorithm Shahin Shafei Young Researchers and Elite Club, Mahabad Branch, Islamic Azad University, Mahabad, Iran Email:Shahin_shafei@yahoo.com

More information

Minimum Area Cost for a 30 to 70 Gbits/s AES Processor

Minimum Area Cost for a 30 to 70 Gbits/s AES Processor Minimum Area Cost for a 30 to 70 Gbits/s AE Processor Alireza Hodjat and Ingrid Verbauwhede Electrical Engineering Department University of California, Los Angeles {ahodjat, ingrid} @ ee.ucla.edu Abstract

More information

Symmetric Cryptography. Chapter 6

Symmetric Cryptography. Chapter 6 Symmetric Cryptography Chapter 6 Block vs Stream Ciphers Block ciphers process messages into blocks, each of which is then en/decrypted Like a substitution on very big characters 64-bits or more Stream

More information

AES as A Stream Cipher

AES as A Stream Cipher > AES as A Stream Cipher < AES as A Stream Cipher Bin ZHOU, Kris Gaj, Department of ECE, George Mason University Abstract This paper presents implementation of advanced encryption standard (AES) as a stream

More information

A Parallel Architecture for Secure FPGA Symmetric Encryption

A Parallel Architecture for Secure FPGA Symmetric Encryption A Parallel Architecture for Secure FPGA Symmetric Encryption E.J. Swankoski, R.R. Brooks Applied Research Laboratory Information Science & Technology Division [ejs224,rrb5]@psu.edu V. Narayanan, M. Kandemir,

More information

SOLUTIONS FOR HOMEWORK # 1 ANSWERS TO QUESTIONS

SOLUTIONS FOR HOMEWORK # 1 ANSWERS TO QUESTIONS SOLUTIONS OR HOMEWORK # 1 ANSWERS TO QUESTIONS 2.4 A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A block cipher is one in which a block of plaintext is treated

More information

@ 2014 SEMAR GROUPS TECHNICAL SOCIETY.

@ 2014 SEMAR GROUPS TECHNICAL SOCIETY. www.semargroup.org, www.ijsetr.com ISSN 2319-8885 Vol.03,Issue.02, February-2014, Pages:0350-0355 Performance Improvement in Fault Detection Schemes for the Advanced Encryption Standard Using Composite

More information

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY

FPGA BASED CRYPTOGRAPHY FOR INTERNET SECURITY Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 10, October 2015,

More information

Optimized Architecture for AES

Optimized Architecture for AES Optimized Architecture for AES Abhijith P. S, Dr. Manish Goswami, S. Tadi, Kamal Pandey Department of Microelectronics, IIIT-Alllahabad, Devghat Jhalwa Allahabad,U.P India. Abstract This paper presents

More information

Modern Block Ciphers

Modern Block Ciphers Modern Block Ciphers now look at modern block ciphers one of the most widely used types of cryptographic algorithms provide secrecy /authentication services focus on DES (Data Encryption Standard) to illustrate

More information

Security Applications

Security Applications 1. Introduction Security Applications Abhyudaya Chodisetti Paul Wang Lee Garrett Smith Cryptography applications generally involve a large amount of processing. Thus, there is the possibility that these

More information

Modern Symmetric Block cipher

Modern Symmetric Block cipher Modern Symmetric Block cipher 81 Shannon's Guide to Good Ciphers Amount of secrecy should determine amount of labour appropriate for encryption and decryption The set of keys and enciphering algorithm

More information

Implementation and Comparative Analysis of AES as a Stream Cipher

Implementation and Comparative Analysis of AES as a Stream Cipher Implementation and Comparative Analysis of AES as a Stream Cipher Bin ZHOU, Yingning Peng Dept. of Electronic Engineering, Tsinghua University, Beijing, China, 100084 e-mail: zhoubin06@mails.tsinghua.edu.cn

More information

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General Considerations:

Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General Considerations: Secret Key Systems (block encoding) Encrypting a small block of text (say 64 bits) General Considerations: Secret Key Systems Encrypting a small block of text (say 64 bits) General Considerations: 1. Encrypted

More information

A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm

A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm N. M. Kosaraju, M. Varanasi & Saraju P. Mohanty VLSI Design and CAD Laboratory Homepage: http://www.vdcl.cse.unt.edu

More information

Applied Cryptography Data Encryption Standard

Applied Cryptography Data Encryption Standard Applied Cryptography Data Encryption Standard Sape J. Mullender Huygens Systems Research Laboratory Universiteit Twente Enschede 1 History DES has a checkered history. The book provided fascinating reading

More information

A Complete Data Scheduler for Multi-Context Reconfigurable Architectures

A Complete Data Scheduler for Multi-Context Reconfigurable Architectures A Complete Data Scheduler for Multi-Context Reconfigurable Architectures M. Sanchez-Elez, M. Fernandez, R. Maestre, R. Hermida, N. Bagherzadeh, F. J. Kurdahi Departamento de Arquitectura de Computadores

More information

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010

Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Secret Key Cryptography Block cipher DES 3DES

More information

PARALLEL ANALYSIS OF THE RIJNDAEL BLOCK CIPHER

PARALLEL ANALYSIS OF THE RIJNDAEL BLOCK CIPHER PARALLEL ANALYSIS OF THE RIJNDAEL BLOCK CIPHER Philip Brisk, Adam Kaplan, Majid Sarrafzadeh Computer Science Department, University of California Los Angeles 3532C Boelter Hall, Los Angeles, CA 90095-1596

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 5 Advanced Encryption Standard Advance Encryption Standard Topics Origin of AES Basic AES Inside Algorithm Final Notes Origins

More information

The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation

The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation Journal of Universal Computer Science, vol. 13, no. 3 (2007), 349-362 submitted: 30/11/06, accepted: 16/2/07, appeared: 28/3/07 J.UCS The Use of Runtime Reconfiguration on FPGA Circuits to Increase the

More information

CCproc: A custom VLIW cryptography co-processor for symmetric-key ciphers

CCproc: A custom VLIW cryptography co-processor for symmetric-key ciphers CCproc: A custom VLIW cryptography co-processor for symmetric-key ciphers Dimitris Theodoropoulos, Alexandros Siskos, and Dionisis Pnevmatikatos ECE Department, Technical University of Crete, Chania, Greece,

More information

Week 4. : Block Ciphers and DES

Week 4. : Block Ciphers and DES Week 4. : Block Ciphers and DES Model of Symmetric Cryptosystem Cryptanalyst Adversary M K E Insecure Channel D Plaintext M Ciphertext C Secure Channel Plaintext M Key K Shared Secret Key C = E K (M) D

More information

Efficient FPGA Implementations of PRINT CIPHER

Efficient FPGA Implementations of PRINT CIPHER Efficient FPGA Implementations of PRINT CIPHER 1 Tadashi Okabe Information Technology Group Tokyo Metropolitan Industrial Technology Research Institute, Tokyo, Japan Abstract This article presents field

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION 1.1 Advance Encryption Standard (AES) Rijndael algorithm is symmetric block cipher that can process data blocks of 128 bits, using cipher keys with lengths of 128, 192, and 256

More information

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA

Hardware Implementation of Cryptosystem by AES Algorithm Using FPGA Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

Design and Implementation of Parallel AES Encryption Engines for Multi-Core Processor Arrays

Design and Implementation of Parallel AES Encryption Engines for Multi-Core Processor Arrays Design and Implementation of Parallel AES Encryption Engines for Multi-Core Processor Arrays M.Sambasiva Reddy 1, P.James Vijay 2, B.Murali Krishna 3 Assistant Professor 1, Assistant Professor 2, Assistant

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

FPGA Implementation of Cryptographic Algorithm in a Multiprocessing System

FPGA Implementation of Cryptographic Algorithm in a Multiprocessing System FPGA Implementation of Cryptographic Algorithm in a Multiprocessing System S.Priya, Swetha Abraham M.E (VLSI Design), Department of ECE, Karpaga Vinayaga College of Engineering and Technology, Madhuranthagam,

More information

Encryption / decryption system. Fig.1. Block diagram of Hummingbird

Encryption / decryption system. Fig.1. Block diagram of Hummingbird 801 Lightweight VLSI Design of Hybrid Hummingbird Cryptographic Algorithm NIKITA ARORA 1, YOGITA GIGRAS 2 12 Department of Computer Science, ITM University, Gurgaon, INDIA 1 nikita.0012@gmail.com, 2 gigras.yogita@gmail.com

More information

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs MACRo 2015-5 th International Conference on Recent Achievements in Mechatronics, Automation, Computer Science and Robotics A Modified Inertial Method for Loop-free Decomposition of Acyclic Directed Graphs

More information

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64.

6. Symmetric Block Cipher BLOWFISH Performance. Memory space. 3. Simplicity The length of the key. The length of the data block is 64. belongs to the same class of conventional symmetric ciphers. The basic principles of have been published in 1994 by Bruce Schneier, as an alternative to the Data encryption standard (DES) to satisfy the

More information

FAULT DETECTION IN THE ADVANCED ENCRYPTION STANDARD. G. Bertoni, L. Breveglieri, I. Koren and V. Piuri

FAULT DETECTION IN THE ADVANCED ENCRYPTION STANDARD. G. Bertoni, L. Breveglieri, I. Koren and V. Piuri FAULT DETECTION IN THE ADVANCED ENCRYPTION STANDARD G. Bertoni, L. Breveglieri, I. Koren and V. Piuri Abstract. The AES (Advanced Encryption Standard) is an emerging private-key cryptographic system. Performance

More information

High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields

High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields High Speed Cryptoprocessor for η T Pairing on 128-bit Secure Supersingular Elliptic Curves over Characteristic Two Fields Santosh Ghosh, Dipanwita Roy Chowdhury, and Abhijit Das Computer Science and Engineering

More information

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas

page 1 Introduction to Cryptography Benny Pinkas Lecture 3 November 18, 2008 Introduction to Cryptography, Benny Pinkas Introduction to Cryptography Lecture 3 Benny Pinkas page 1 1 Pseudo-random generator Pseudo-random generator seed output s G G(s) (random, s =n) Deterministic function of s, publicly known G(s) = 2n Distinguisher

More information

The MorphoSys Parallel Reconfigurable System

The MorphoSys Parallel Reconfigurable System The MorphoSys Parallel Reconfigurable System Guangming Lu 1, Hartej Singh 1,Ming-hauLee 1, Nader Bagherzadeh 1, Fadi Kurdahi 1, and Eliseu M.C. Filho 2 1 Department of Electrical and Computer Engineering

More information

Block Ciphers. Secure Software Systems

Block Ciphers. Secure Software Systems 1 Block Ciphers 2 Block Cipher Encryption function E C = E(k, P) Decryption function D P = D(k, C) Symmetric-key encryption Same key is used for both encryption and decryption Operates not bit-by-bit but

More information

Design methodology for multi processor systems design on regular platforms

Design methodology for multi processor systems design on regular platforms Design methodology for multi processor systems design on regular platforms Ph.D in Electronics, Computer Science and Telecommunications Ph.D Student: Davide Rossi Ph.D Tutor: Prof. Roberto Guerrieri Outline

More information

An Efficient Stream Cipher Using Variable Sizes of Key-Streams

An Efficient Stream Cipher Using Variable Sizes of Key-Streams An Efficient Stream Cipher Using Variable Sizes of Key-Streams Hui-Mei Chao, Chin-Ming Hsu Department of Electronic Engineering, Kao Yuan University, #1821 Jhongshan Rd., Lujhu Township, Kao-Hsiung County,

More information

OPTICAL networks require secure data transmission at

OPTICAL networks require secure data transmission at 366 IEEE TRANSACTIONS ON COMPUTERS, VOL. 55, NO. 4, APRIL 2006 Area-Throughput Trade-Offs for Fully Pipelined 30 to 70 Gbits/s AES Processors Alireza Hodjat, Student Member, IEEE, and Ingrid Verbauwhede,

More information

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis

A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis A Countermeasure Circuit for Secure AES Engine against Differential Power Analysis V.S.Subarsana 1, C.K.Gobu 2 PG Scholar, Member IEEE, SNS College of Engineering, Coimbatore, India 1 Assistant Professor

More information

Performance and Overhead in a Hybrid Reconfigurable Computer

Performance and Overhead in a Hybrid Reconfigurable Computer Performance and Overhead in a Hybrid Reconfigurable Computer Osman Devrim Fidanci 1, Dan Poznanovic 2, Kris Gaj 3, Tarek El-Ghazawi 1, Nikitas Alexandridis 1 1 George Washington University, 2 SRC Computers

More information

Data Encryption Standard (DES)

Data Encryption Standard (DES) Data Encryption Standard (DES) Best-known symmetric cryptography method: DES 1973: Call for a public cryptographic algorithm standard for commercial purposes by the National Bureau of Standards Goals:

More information

Secret Key Cryptography

Secret Key Cryptography Secret Key Cryptography General Block Encryption: The general way of encrypting a 64-bit block is to take each of the: 2 64 input values and map it to a unique one of the 2 64 output values. This would

More information

Area Optimization in Masked Advanced Encryption Standard

Area Optimization in Masked Advanced Encryption Standard IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 04, Issue 06 (June. 2014), V1 PP 25-29 www.iosrjen.org Area Optimization in Masked Advanced Encryption Standard R.Vijayabhasker,

More information

Cryptography Functions

Cryptography Functions Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)

More information

Chapter 6: Contemporary Symmetric Ciphers

Chapter 6: Contemporary Symmetric Ciphers CPE 542: CRYPTOGRAPHY & NETWORK SECURITY Chapter 6: Contemporary Symmetric Ciphers Dr. Lo ai Tawalbeh Computer Engineering Department Jordan University of Science and Technology Jordan Why Triple-DES?

More information

Transaction Level Model Simulator for NoC-based MPSoC Platform

Transaction Level Model Simulator for NoC-based MPSoC Platform Proceedings of the 6th WSEAS International Conference on Instrumentation, Measurement, Circuits & Systems, Hangzhou, China, April 15-17, 27 17 Transaction Level Model Simulator for NoC-based MPSoC Platform

More information

6 Block Ciphers. 6.1 Block Ciphers CA642: CRYPTOGRAPHY AND NUMBER THEORY 1

6 Block Ciphers. 6.1 Block Ciphers CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 CA642: CRYPTOGRAPHY AND NUMBER THEORY 1 6 Block Ciphers 6.1 Block Ciphers Block Ciphers Plaintext is divided into blocks of fixed length and every block is encrypted one at a time. A block cipher is a

More information

Chapter 7 Advanced Encryption Standard (AES) 7.1

Chapter 7 Advanced Encryption Standard (AES) 7.1 Chapter 7 Advanced Encryption Standard (AES) 7.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7 Objectives To review a short history of AES To define

More information

Network Security. Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar

Network Security. Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar Network Security Lecture# 6 Lecture Slides Prepared by: Syed Irfan Ullah N.W.F.P. Agricultural University Peshawar Modern Block Ciphers now look at modern block ciphers one of the most widely used types

More information

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut

Side channel attack: Power Analysis. Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Side channel attack: Power Analysis Chujiao Ma, Z. Jerry Shi CSE, University of Connecticut Conventional Cryptanalysis Conventional cryptanalysis considers crypto systems as mathematical objects Assumptions:

More information

Symmetric Cryptography

Symmetric Cryptography CSE 484 (Winter 2010) Symmetric Cryptography Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

ENEE 459-C Computer Security. Symmetric key encryption in practice: DES and AES algorithms

ENEE 459-C Computer Security. Symmetric key encryption in practice: DES and AES algorithms ENEE 459-C Computer Security Symmetric key encryption in practice: DES and AES algorithms A perfect encryption of a block Say you have a block of n bits You want to encrypt it You want to use the same

More information

Design Implementation of Composite Field S-Box using AES 256 Algorithm

Design Implementation of Composite Field S-Box using AES 256 Algorithm International Journal of Emerging Engineering Research and Technology Volume 3, Issue 12, December 2016, PP 43-51 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) Design Implementation of Composite Field

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less Multiplication

Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less Multiplication Vortex: A New Family of One-way Hash Functions Based on AES Rounds and Carry-less ultiplication Shay Gueron 2, 3, 4 and ichael E. Kounavis 1 1 Corresponding author, Corporate Technology Group, Intel Corporation,

More information

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM

FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM FPGA CAN BE IMPLEMENTED BY USING ADVANCED ENCRYPTION STANDARD ALGORITHM P. Aatheeswaran 1, Dr.R.Suresh Babu 2 PG Scholar, Department of ECE, Jaya Engineering College, Chennai, Tamilnadu, India 1 Associate

More information

3 Symmetric Cryptography

3 Symmetric Cryptography CA4005: CRYPTOGRAPHY AND SECURITY PROTOCOLS 1 3 Symmetric Cryptography Symmetric Cryptography Alice Bob m Enc c = e k (m) k c c Dec m = d k (c) Symmetric cryptography uses the same secret key k for encryption

More information

Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware

Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware Master s Thesis Pawel Chodowiec MS CpE Candidate, ECE George Mason University Advisor: Dr. Kris Gaj, ECE George

More information

Cryptography and Network Security. Sixth Edition by William Stallings

Cryptography and Network Security. Sixth Edition by William Stallings Cryptography and Network Security Sixth Edition by William Stallings Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon Mungo had been working on Stern's code, principally with

More information

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa

ICT 6541 Applied Cryptography. Hossen Asiful Mustafa ICT 6541 Applied Cryptography Hossen Asiful Mustafa Encryption & Decryption Key (K) Plaintext (P) Encrypt (E) Ciphertext (C) C = E K (P) Same Key (K) Ciphertext (C) Decrypt (D) Plaintext (P) P = D K (C)

More information

Software Pipelining for Coarse-Grained Reconfigurable Instruction Set Processors

Software Pipelining for Coarse-Grained Reconfigurable Instruction Set Processors Software Pipelining for Coarse-Grained Reconfigurable Instruction Set Processors Francisco Barat, Murali Jayapala, Pieter Op de Beeck and Geert Deconinck K.U.Leuven, Belgium. {f-barat, j4murali}@ieee.org,

More information

Processor Architectures At A Glance: M.I.T. Raw vs. UC Davis AsAP

Processor Architectures At A Glance: M.I.T. Raw vs. UC Davis AsAP Processor Architectures At A Glance: M.I.T. Raw vs. UC Davis AsAP Presenter: Course: EEC 289Q: Reconfigurable Computing Course Instructor: Professor Soheil Ghiasi Outline Overview of M.I.T. Raw processor

More information

Performance Study of a Compiler/Hardware Approach to Embedded Systems Security

Performance Study of a Compiler/Hardware Approach to Embedded Systems Security Performance Study of a Compiler/Hardware Approach to Embedded Systems Security Kripashankar Mohan, Bhagi Narahari, Rahul Simha, Paul Ott 1, Alok Choudhary, and Joe Zambreno 2 1 The George Washington University,

More information

Cryptography and Network Security

Cryptography and Network Security Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 6: Advanced Encryption Standard (AES) Ion Petre Department of IT, Åbo Akademi University 1 Origin of AES 1999: NIST

More information

Differential Fault Analysis on the AES Key Schedule

Differential Fault Analysis on the AES Key Schedule ifferential Fault Analysis on the AES Key Schedule Junko TAKAHASHI and Toshinori FUKUNAGA NTT Information Sharing Platform Laboratories, Nippon Telegraph and Telephone Corporation, {takahashi.junko, fukunaga.toshinori}@lab.ntt.co.jp

More information

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key

CSc 466/566. Computer Security. 6 : Cryptography Symmetric Key 1/56 CSc 466/566 Computer Security 6 : Cryptography Symmetric Key Version: 2012/02/22 16:14:16 Department of Computer Science University of Arizona collberg@gmail.com Copyright c 2012 Christian Collberg

More information

Performance of Symmetric Ciphers and One-way Hash Functions

Performance of Symmetric Ciphers and One-way Hash Functions Performance of Symmetric Ciphers and One-way Hash Functions Michael Roe Cambridge University Computer Laboratory 1 Rationale An alarmingly large number of different cryptosystems have been proposed for

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Applications and Standards Third Edition William Stallings Chapter 2 Symmetric Encryption and Message Confidentiality Dr. BHARGAVI H. GOSWAMI Department of Computer Science

More information

Fully Pipelined High Throughput Cost Effective FPGA Based Implementation of AES Algorithm

Fully Pipelined High Throughput Cost Effective FPGA Based Implementation of AES Algorithm Fully Pipelined High Throughput Cost Effective FPGA Based Implementation of AES Algorithm Athira Das A J 1, Ajith Kumar B P 2 1 Student, Dept. of Electronics and Communication, Karavali Institute of Technology,

More information

AES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications

AES1. Ultra-Compact Advanced Encryption Standard Core AES1. General Description. Base Core Features. Symbol. Applications General Description The AES core implements Rijndael encoding and decoding in compliance with the NIST Advanced Encryption Standard. Basic core is very small (less than 3,000 gates). Enhanced versions

More information

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50

Advanced Encryption Standard and Modes of Operation. Foundations of Cryptography - AES pp. 1 / 50 Advanced Encryption Standard and Modes of Operation Foundations of Cryptography - AES pp. 1 / 50 AES Advanced Encryption Standard (AES) is a symmetric cryptographic algorithm AES has been originally requested

More information

Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors

Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors Stefan Tillich and Johann Großschädl Graz University of Technology, Institute for Applied Information Processing and Communications,

More information

Parallel Computing. Slides credit: M. Quinn book (chapter 3 slides), A Grama book (chapter 3 slides)

Parallel Computing. Slides credit: M. Quinn book (chapter 3 slides), A Grama book (chapter 3 slides) Parallel Computing 2012 Slides credit: M. Quinn book (chapter 3 slides), A Grama book (chapter 3 slides) Parallel Algorithm Design Outline Computational Model Design Methodology Partitioning Communication

More information