1,458 Hits in 4.1 sec

Designing integrated accelerator for stream ciphers with structural similarities

Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
2012 Cryptography and Communications  
As our second case study, we present IntAcc-RCHC, an integrated accelerator for the stream ciphers RC4 and HC-128.  ...  We propose HiPAcc-LTE, a high performance integrated design that combines the two ciphers in hardware, based on their structural similarities.  ...  If one wants to implement two or more stream ciphers on the same platform, and if the ciphers share certain structural similarities, then how should one approach the design of an integrated accelerator  ... 
doi:10.1007/s12095-012-0074-6 fatcat:vapjaw7vbnbvnc22uideavxrca

HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers [chapter]

Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid
2011 Lecture Notes in Computer Science  
In this paper, we propose HiPAcc-LTE, a high performance integrated design that combines the two ciphers in hardware, based on their structural similarities.  ...  Long term vision of this hardware integration approach for cryptographic primitives is to build a flexible core supporting multiple designs having similar algorithmic structures.  ...  The authors are grateful to the anonymous reviewers of Indocrypt 2011 for their critical review comments that helped in improving the technical quality of this paper.  ... 
doi:10.1007/978-3-642-25578-6_16 fatcat:23fgdseuhbhfxdiwsdpadrziy4

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
For hardware and software acceleration, basic operations are usually used in stream ciphers design.  ...  Block cipher based stream cipher Many stream ciphers are proposed with the design idea of block ciphers, such as based on the basic operation, round function or algorithm structure of a block cipher, even  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

Area-Efficient Parallel Reconfigurable Stream Processor For Symmetric Cryptograph

Yufei Zhu, Zuocheng Xing, Jinhui Xue, Zerun Li, Yifan Hu, Yang Zhang, Yongzhong Li
2021 IEEE Access  
In this study, we organically integrate a cipher processing structure with a stream processing structure. Therefore, we further propose stream-structured cipher operation clusters for block ciphers.  ...  PR 2 SP fully integrates the stream-state processing characteristics of symmetric ciphers (block ciphers) with the advantages of a stream architecture.  ... 
doi:10.1109/access.2021.3057866 fatcat:65qwawavfvgrnoccgedydrkp7a

Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration

G. Gaubatz, B. Sunar
2005 Fourth IEEE International Symposium on Network Computing and Applications  
The Kasumi block cipher provides integrity and confidentiality services for 3G wireless networks, but it also forms a bottleneck due to its computational overhead.  ...  Especially in infrastructure equipment with data streams from multiple connections entering and leaving the network processor the critical performance issue needs to be addressed.  ...  The Kasumi Block Cipher The design of the Kasumi block cipher is based on a similar cipher design called Misty1 [7] .  ... 
doi:10.1109/nca.2005.28 dblp:conf/nca/GaubatzS05 fatcat:nkggvntgurcy3ila2pr5mbkbla

FPGA implementation of IPsec protocol suite for multigigabit networks

Mateusz Korona, Krzysztof Skowron, Mateusz Trzepinski, Mariusz Rawski
2017 2017 International Conference on Systems, Signals and Image Processing (IWSSIP)  
In modern digital world, there is a strong demand for efficient data streams processing methods.  ...  This paper presents principles of high-performance FPGA architecture for data streams processing on example of IPsec gateway implementation.  ...  Similar tests were conducted for IPsec gateway using AES block cipher in CBC mode, which is more advanced than DES.  ... 
doi:10.1109/iwssip.2017.7965619 dblp:conf/iwssip/KoronaSTR17 fatcat:y6hoxnn7xrctvmmbrxjhjkrh7e

High-Efficiency Parallel Cryptographic Accelerator for Real-Time Guaranteeing Dynamic Data Security in Embedded Systems

Zhun Zhang, Xiang Wang, Qiang Hao, Dongdong Xu, Jinlei Zhang, Jiakang Liu, Jinhui Ma
2021 Micromachines  
Therefore, this paper presents a security SoC architecture with integrating a four-parallel Advanced Encryption Standard-Galois/Counter Mode (AES-GCM) cryptographic accelerator for achieving high-efficiency  ...  cryptographic accelerator does not incur significant performance overhead on providing confidentiality and integrity protections for exchanged data; its average performance overhead reduces to as low as  ...  Our SoC framework architecture with integration of a cryptographic accelerator for dynamic data monitoring is shown in Figure 1 .  ... 
doi:10.3390/mi12050560 pmid:34063441 fatcat:o6e4zpjoure6tcx245jzah6wgq

A Cryptographic Toolbox for Feedback Control Systems

Petter Solnør
2020 Modeling, Identification and Control  
Code (HMAC), and the stream ciphers from the eSTREAM portfolio, is introduced.  ...  In this paper, a toolbox containing implementations of state-of-the-art high-performance algorithms such as the Advanced Encryption Standard (AES), the AEGIS stream cipher, the Keyed-Hash Message Authentication  ...  ChaCha The ChaCha stream cipher is a variant of the Salsafamily of stream ciphers and was designed by Bernstein (2008) .  ... 
doi:10.4173/mic.2020.4.3 fatcat:bev4ikp2x5g77pbi46vazhhlqi


Mohamed Nabil, Alaa Eldin Rohiem
2007 International Conference on Aerospace Sciences and Aviation Technology  
The design was described using the hardware description language VHDL (Very high speed integrated circuit hardware description language).  ...  The design was implemented on devices from XILINX and we achieved speeds of up to 280 Mbits/s.  ...  One of the most widely used stream ciphers is the RC4 stream cipher. It was designed by R. Rivest in 1987[3] .  ... 
doi:10.21608/asat.2007.24121 fatcat:rqg3cob6ondjlhf75chg4xme2i

Patterned Cipher Block for Low-Latency Secure Communication

Seounghwan Oh, Seongjoon Park, Hwangnam Kim
2020 IEEE Access  
Our cryptography design incorporates patterned cipher block (PCB) operation, an integrity verification technique to identify if a ciphertext has been forged, handshaking protocol exchanging pattern information  ...  To cope with the constraints, security systems must choose between time cost and security.  ...  GCM) or stream ciphers are used.  ... 
doi:10.1109/access.2020.2977953 fatcat:qweckhbpkrd5fl2ts5ltie6uea

ExTru: A Lightweight, Fast, and Secure Expirable Trust for the Internet of Things [article]

Hadi Mardani Kamali, Kimia Zamiri Azar, Shervin Roshanisefat, Ashkan Vakil, Avesta Sasan
2020 arXiv   pre-print
The resource-constrained nature of the Internet of Things (IoT) devices, poses a challenge in designing a secure, reliable, and particularly high-performance communication for this family of devices.  ...  an architecture that only uses a conventional side-channel resistant block/stream cipher.  ...  Since IoT being an emerging field requires lightweight cipher designs with robustness, less complexity, and lower energy consumption, stream ciphers are very suited for particularly edge devices.  ... 
arXiv:2004.06235v1 fatcat:ffeh65o7gzgtlbltx7zzrljf6m

HiCrypt: A Specialized Translator for Symmetric Block Cipher and GPGPU

Keisuke IWAI, Naoki NISHIKAWA, Takakazu KUROKAWA
2013 IEICE transactions on information and systems  
Generated programs perform high throughput almost identical to hand optimized programs for all five cipher programs.  ...  Users must annotate only variables and an encoding/decoding function, which are characteristics of cipher programs, with directives.  ...  Acknowledgements This work is supported by Grant-in-Aid for Young Scientists B (25871223).  ... 
doi:10.1587/transinf.e96.d.2575 fatcat:cq377kiotffczgk44qoioocp4a

Stream vs block ciphers for scan encryption

Emanuele Valea, Mathieu Da Silva, Marie-Lise Flottes, Giorgio Di Natale, Bruno Rouzeyre
2019 Microelectronics Journal  
Security in the Integrated Circuits (IC) domain is an important challenge, especially with regard to the side channel offered by test infrastructures.  ...  Two types of ciphers can be employed: stream ciphers or block ciphers. Both have pros and cons in terms of performance (footprint, impact on test activity) and security.  ...  The structure of the encryption with stream cipher is shown in Fig. 4 .  ... 
doi:10.1016/j.mejo.2019.02.019 fatcat:alh2gwrt6fejzloazymwbc3w5u

RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers

Ayesha Khalid, Muhammad Hassan, Goutam Paul, Anupam Chattopadhyay
2016 Journal of Cryptographic Engineering  
-A similar rapid prototyping tool for stream ciphers, called RunStream, is in the pipeline. -Inclusion of cryptanalytic tools for block ciphers ciphers is intended.  ...  A similar design has been presented for smallest area footprint of PRESENT-80 in [13] .  ...  CRYKET (CRYptographic Kernels Toolkit) caters to rapid prototyping of various cryptographic functions while RunFein is an instance of it dealing with block ciphers.  ... 
doi:10.1007/s13389-016-0116-7 fatcat:rwgbiittbnav3m2gqvxlibwgre

Energy efficiency of symmetric key cryptographic algorithms in wireless sensor networks

Xueying Zhang, Howard M. Heys, Cheng Li
2010 2010 25th Biennial Symposium on Communications  
In conclusion, we recommend using a block cipher instead of a stream cipher to encrypt data for wireless sensor network applications and using a cipher feedback scheme for the cipher operation, thereby  ...  Results show that the computational energy cost of block ciphers is less than that of stream ciphers when data is encrypted and transmitted through a noisy channel.  ...  and designed for software purposes.  ... 
doi:10.1109/bsc.2010.5472979 fatcat:gk2ppucfpjeuvavu5226t23y4u
« Previous Showing results 1 — 15 out of 1,458 results