Instruction Set Extensions for Cryptographic Applications: Survey and Issues

Mahendra Singh, Manoj Jain
2014 Journal of Basic and Applied Engineering Research Print   unpublished
Security in data communication is of utmost importance and is achieved using cryptographic algorithms while preserving confidentiality and integrity of data. In processors those implement cryptographic algorithms; critical computations are migrated from processor core to an application specific unit for performing computing-intensive task efficiently where each unit executes application specific instruction set extensions. Instruction set extension is one of the ways to improve the performance
more » ... f processors running cryptographic applications. It is an effective way to execute computing intensive task of encryption and decryption. There is a significant performance improvement using instruction set extensions like Intel's AES-NI (Advanced Encryption Standard New Instructions) as compared to other software implementations. This paper is an attempt to survey the available instruction set extensions used in cryptographic applications and to identify some of the issues which needs to be addressed.
fatcat:r2z3xuj4vjfsbj76lhktw4wdgi