A HARDWARE DESIGN-MODEL FOR CRYPTOGRAPHIC ALGORITHMS

被引:0
|
作者
DAEMEN, J
GOVAERTS, R
VANDEWALLE, J
机构
关键词
HARDWARE CRYPTOGRAPHY; STREAM CIPHERS; BLOCK CIPHERS; CRYPTOGRAPHIC HASH FUNCTIONS; PSEUDORANDOM SEQUENCE GENERATORS;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A hardware implementation model is proposed that can be used in the design of stream ciphers, block ciphers and cryptographic hash functions. The cryptographic finite state machine (CFSM) model is no mathematical tool, but a set of criteria that have to be met by a real hardware finite state machine that will be used in the implementation of a cryptographic algorithm. Diffusion is studied by means of the diffusion graph and dependence matrix. For the study of confusion differential cryptanalysis is used. In the paper the design of a high-speed cryptographic coprocessor is presented called Subterranean. This coprocessor can be used for both cryptographic pseudorandom sequence generation and cryptographic hashing. It can be implemented in a straightforward way as (part of) a chip. The small gate-delay allows high clockfrequencies, and even a moderate estimation of 20 MHz leads to a (stream-)encryption speed of 0.3 Gbit/s and hashing speed of 0.6 Gbit/sec.
引用
收藏
页码:419 / 434
页数:16
相关论文
共 50 条
  • [1] Asynchronous cryptographic hardware design
    Teifel, John
    2006: 40th Annual IEEE International Carnahan Conferences Security Technology, Proceedings, 2006, : 221 - 227
  • [2] Hardware Design of Cryptographic Accelerator
    Hulic, Michal
    Vokorokos, Liberios
    Adam, Norbert
    Fecil'ak, Peter
    2018 IEEE 16TH WORLD SYMPOSIUM ON APPLIED MACHINE INTELLIGENCE AND INFORMATICS (SAMI 2018): DEDICATED TO THE MEMORY OF PIONEER OF ROBOTICS ANTAL (TONY) K. BEJCZY, 2018, : 201 - 206
  • [3] Analysis of Cryptographic Algorithms on IoT Hardware platforms
    El-hajj, Mohammed
    Chamoun, Maroun
    Fadlallah, Ahmad
    Serhrouchni, Ahmed
    2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
  • [4] THE HOLOGRAPHIC ORGANIZATION - A DESIGN-MODEL
    JOHANNESSEN, JA
    CYBERNETICS AND SYSTEMS, 1991, 22 (01) : 41 - 55
  • [5] THE DEVELOPMENT OF AN ILLUSTRATION DESIGN-MODEL
    RANKIN, RO
    ETR&D-EDUCATIONAL TECHNOLOGY RESEARCH AND DEVELOPMENT, 1989, 37 (02): : 25 - 46
  • [6] A DESIGN-MODEL FOR SEMIRIGID CONNECTIONS
    WU, FH
    CHEN, WF
    ENGINEERING STRUCTURES, 1990, 12 (02) : 88 - 97
  • [7] Comparison of Hardware Implementations of Cryptographic Algorithms for IoT Applications
    Goswami, Sushree Sila P.
    Trivedi, Gaurav
    2023 33RD INTERNATIONAL CONFERENCE RADIOELEKTRONIKA, RADIOELEKTRONIKA, 2023,
  • [8] Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platforms
    El-Hajj, Mohammed
    Fadlallah, Ahmad
    2022 32ND INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2022, : 121 - 126
  • [9] Error prevention, detection and diffusion algorithms for cryptographic hardware
    Nikodem, Maciej
    DEPCOS - RELCOMEX '07: INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, PROCEEDINGS, 2007, : 127 - 134
  • [10] Analysis of Lightweight Cryptographic Algorithms on IoT Hardware Platform
    El-hajj, Mohammed
    Mousawi, Hussien
    Fadlallah, Ahmad
    FUTURE INTERNET, 2023, 15 (02):