期刊文献+

面向序列密码的比特级抽取指令研究与设计 被引量:1

Research and Design of Bit-Level Extraction Instruction for Stream Cipher
下载PDF
导出
摘要 针对通用处理器中比特级操作效率低下的问题,提出了一种面向序列密码算法的比特级抽取指令,并构造了与之相应的硬件单元。将该单元在CMOS 0.13μm工艺下完成综合,同时通过NIOSⅡ扩展指令的方式把设计的专用指令加入到处理器中进行了性能评估。结果表明:该指令的加入并不影响处理器的处理器频率,与未经扩展指令的嵌入式RSIC处理器相比,完成相同的抽取操作指令条数从250条减少为1条,有效地提升了序列密码算法的处理性能。 Current microprocessors do not directly support bit level arbitrary permutations when implemented with software instrucions. This paper proposes a new bit level instrucion named "extract"for stream ciphers and presents a corresponding bit level functional hardware which synthesizes and is optimized with CMOS 0. 13μm technology. Moreover,the instrucion is also added into the ISA of NIOSⅡ microprocessors. The result shows that adding the instrucion can improve the stream cipher effectively without hindering the maximum frequency of general-purpose processors,and the number of the extract operations decreases from 250 to 1.
机构地区 信息工程大学
出处 《信息工程大学学报》 2015年第1期123-128,共6页 Journal of Information Engineering University
关键词 抽取操作 序列密码 处理器 extraction operation stream cipher processors
  • 相关文献

参考文献11

  • 1Hilewitz Y, Ruby Lee B. A new basis for shifter in general-purpose processors for exiting and advanced bit manipulations[ J ]. IEEE Transactions on computers, 2009,58 (8) : 1035-1048.
  • 2金晨辉,郑浩然,张少武,等.密码学[M].北京:高等教育出版社,2009.
  • 3Ruby B, Lee Z J shi, Yin Y L. On Permutation Operations in Cipher Design[ C]//Proeeedings of the International cnnferenee on information technology ( ITCC ). 2004, (2) :569-577.
  • 4张玉安,冯登国.欧洲流密码加密标准的竞评[J].信息安全与通信保密,2003(3):38-41. 被引量:8
  • 5刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7
  • 6Robshaw M J B. Stream Ciphers[ M]. RSA Laboratories Technical Report. 1995.
  • 7徐建博,戴紫彬,李伟,苏阳.面向序列密码的抽取与插入单元可重构设计研究[J].电子技术应用,2011,37(7):65-67. 被引量:9
  • 8Hilewitz Y, Shi Z J, Ruby B Lee. Comparing fast implementations of bit permutation instructions[ C]//IEEE Aslomar confer- ence on Signals, Systems and Computers. 2004, (2) :1856-1863.
  • 9(英)斯威特曼.MIPS处理器设计透视[M].赵俊良,译.北京:北京航空航窄大学出版社,2005.
  • 10Hilewitz Y, Ruby B Lee. Fast bit gather, bit scatter and bit permutation instructions for commodity microprocessor[ J ]. J. Signal Processing Systems, 2008, 53 ( 1-2 ) : 145-169.

二级参考文献16

  • 1罗启彬,张健.流密码的现状和发展[J].信息与电子工程,2006,4(1):75-80. 被引量:18
  • 2刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(上)[J].信息安全与通信保密,2006,28(7):26-28. 被引量:7
  • 3刘运毅,覃团发,倪皖荪,张淑仪.简评ECRYPT的候选流密码算法(下)[J].信息安全与通信保密,2006,28(9):17-21. 被引量:7
  • 4I Ruby B Lee, Shi Z J, Yin Y L. On Permutation Operations in Cipher Design[ C ]//Proceedings of the International conference on information technology (ITCC) ,2004.
  • 5Hilewitz Y, Shi Z J, Ruby B Lee. Comparing fast implementations of bit permutation instructions [ C ]//Proc. of IEEE Aslomar conference on Signals, Systems and Computers, Nov. 2004.
  • 6Hilewitz Y, Ruby B Lee. Fast bit gather, bit scatter and bit permuta- tion instructions for commodity microprocessors [ J ]. J. Signal Process- ing Systems, 2008, 53.
  • 7Hilewitz Y, Ruby B Lee. A new basis for shifter in general-purpose processors for exiting and advanced bit manipulations [ J 1. IEEE Transactions on computers, 2009,58.
  • 8Nan Longmei, Dai Zhibin. Design and Implementation of Configurabte Extract Instructions targeted at Stream Cipher Processing[C]//8th International Conference on ASIC, 2009.
  • 9Swartzlander Jr E E. A Review of Large Parallel Counter Designs [C]//IEEE Symposium on VLSI, Feb. 2004.
  • 10徐建博,戴紫彬,李伟,苏阳.面向序列密码的抽取与插入单元可重构设计研究[J].电子技术应用,2011,37(7):65-67. 被引量:9

共引文献34

同被引文献6

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部