期刊文献+

加速对称密码编码的快速S盒代换指令及其硬件实现 被引量:1

Fast S-Box Substitution Instructions and Their Hardware Implementation Scheme Accelerating Symmetric Cryptographic Processing
下载PDF
导出
摘要 S盒代换是大多数对称密码算法的核心操作,加快S盒代换是提高密码编码处理速度的关键。本文采用专用指令扩展的方法支持快速S盒代换,构造了一种灵活的并行S盒单元,设计了S盒代换指令。并行S盒单元由多路查找表和一个后处理模块组成,它作为功能部件集成到Leon2处理器片上。在Virtex-Ⅱ XC2V3000 FPGA上的综合结果表明,扩展后的处理器中并行S盒单元仅使用了1KB的存储和少量的逻辑资源。依据Amdahl定律评估了S盒代换指令的效率,对AES算法可以取得两倍以上的总体加速,对使用S盒操作的其他对称密码预计也能得到显著加速。 In popular symmetric ciphers, the S-box substitution is the core operation that dominates the execution of cryptographic algorithms. In this paper, a method of application-specific instruction-set extension is used for accelerating this key operation in symmetric cryptography. By constructing a novel flexible on-chip parallel substitution box unit consisting of multiple lookup tables and a post-processing module, two instructions for the S-box access are designed and integrated into the 32-bit Leon2 processor. Implementing the extended processor core on Virtex-Ⅱ XC2V3000 FPGA shows that the parallel substitution box unit uses only 1KB of memory and a small amount of logic circuits. Evaluation of the efficiency of the S-box access instructions for AES is conducted according to the Amdahl Law, and the results show that the overall speedup greater than 2 can be achieved. Benefits for other symmetric ciphers using the S-box substitution as their core operation are accordingly expected.
出处 《计算机工程与科学》 CSCD 北大核心 2009年第7期98-101,共4页 Computer Engineering & Science
基金 中国科学院研究生院立项课题资助项目(06JT079J01)
关键词 对称密码 S盒代换 查找表 指令扩展 symmetric cryptography S-box substitution lookup table instruction set extension
  • 相关文献

参考文献15

  • 1Stallings W. Cryptography and Network Security: Principles and Practices[M].Prentice Hall, 2006.
  • 2Schneier B. Applied Cryptography[M]. New York: Wieley, 1996.
  • 3Menezes A J, van Oorschot P C, Vanstone S A. Handbook of Applied Cryptography[M]. CRC Press, 1996.
  • 4Hodjat A, Verbauwhede I. High-throughput Cryptocoprocessor[J]. IEEE Micro, 2004.
  • 5Tillich S, Grol3schadl J. Instruction Set Extensions for Efficient AES Implementation on 32-bit Processors[C]//Proc of CHES'06, 2006:270-284.
  • 6Fiskiran A M, Lee R 13. On-Chip Lookup Tables for Fast Symmetric-Key Encryption[C]//Proc of the IEEE 16th Int'l Conf on Application-Specific Systems, Architectures, and Processors, 2005:356-363.
  • 7Burke J, McDonald J, Austin T. Architectural Support for Fast Symmetric-Key Cryptography[C]///Proc of ASPLOS' 00, 2000.
  • 8National Institute of Standards and Technology (NIST), Data Encryption Standard (DES)[S]. FIPS Publication 46-3, 1999.
  • 9National Institute of Standards and Technology (NIST), Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher[S]. NIST Special Publication 800-67, 2004.
  • 10National Institute of Standards and Technology (NIST), Advanced Encryption Standard (AES)[S]. FIPS Publication 197, 2001.

同被引文献9

  • 1金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 2郑武,尹方,金纯.蓝牙加密算法及其VC++实现[J].计算机应用与软件,2007,24(11):207-209. 被引量:1
  • 3Jin Chen-hui, Zheng Hao-ran, Zhang Shao-wu, et al. Cryptogra- phy [ M ]. Beijing: Higher Education Press ,2009.
  • 4ECRYPT. eSTREAM, the ECRYPT stream cipher project [ EB/ OL]. http ://www. ecrypt.eu. org/stream/project, html, 2008.
  • 5Hilewitz Y, Ruby B Lee. Fast bit gather, bit scatter and bit permu- tation instructions for commodity microprocessors [ J ]. Journal of Signal Processing Systems for Signal Image and Video Technology, 2008,53 : 145-169.
  • 6Cardarilli G C, L Di Nunzio, Fazzolari R, et al. Butterfly and inverse butterfly nets integration on altera NIOS-II embedded processor [C ]. In: Signals, Systems and Computers ( ASILOMAR), Pacific Grove, CA, 2010: 1279-1283.
  • 7Hilewitz Yedidya. Advanced bit manipulation instructions: archi- tecture, implementation and applications[ D ]. New Jersey, Prince- ton University, 2008.
  • 8Li Wei, Research on technology of reconfigurable parallel feedback shift register targeted at stream cipher[ D]. Zhengzhou: PLA Information Engineering University ,2009.
  • 9徐建博,戴紫彬,李伟,苏阳.面向序列密码的抽取与插入单元可重构设计研究[J].电子技术应用,2011,37(7):65-67. 被引量:9

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部