Affiliation:
1. Infineon Technologies AG, Neubiberg (near Munich), Germany
2. Ss Cyril and Methodius University, Skopje, Macedonia
3. Food and Agriculture University, Konya, Turkey
Abstract
Authenticated encryption (AE) has been a vital operation in cryptography due to its ability to provide confidentiality, integrity, and authenticity at the same time. Its use has soared in parallel with widespread use of the internet and has led to several new schemes. There have been studies investigating software performance of various schemes. However, the same is yet to be done for hardware. We present a comprehensive survey of hardware (specifically ASIC) performance of the most commonly used AE schemes in the literature. These schemes include encrypt-then-MAC combination, block-cipher-based AE modes, and the recently introduced permutation-based AE scheme. For completeness, we implemented each scheme with various standardized block ciphers and/or hash algorithms, and their lightweight versions. Our evaluation targets minimizing the time-area product while maximizing the throughput on an ASIC platform. We used 45nm NANGATE Open Cell Library for syntheses. We present area, speed, time-area product, throughput, and power figures for both standard and lightweight versions of each scheme. We also provide an unbiased discussion on the impact of the structure and complexity of each scheme on hardware implementation. Our results reveal 13%--30% performance boost in permutation-based AE compared to conventional schemes, and they can be used as a benchmark in the ongoing AE competition CAESAR.
Funder
DFG Research Training Group
Publisher
Association for Computing Machinery (ACM)
Subject
General Computer Science,Theoretical Computer Science
Reference46 articles.
1. AES. 2001. Advanced Encryption Standard. FIPS PUB 197 Federal Information Processing Standards Publication. AES. 2001. Advanced Encryption Standard. FIPS PUB 197 Federal Information Processing Standards Publication.
2. Lecture Notes in Comput. Sci.;Aumasson Jean-Philippe,2010
3. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm
4. Advances in Cryptology — CRYPTO 2000
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献