Efficient implementation scheme of SM4 algorithm based on FPGA

被引:0
作者
Zhang, Hongke [1 ,2 ,3 ]
Yuan, Haonan [3 ,4 ]
Ding, Wenxiu [1 ,3 ]
Yan, Zheng [1 ,3 ,4 ]
Li, Bin [2 ]
Liang, Dong [1 ,2 ]
机构
[1] School of Cyber Engineering, Xidian University, Xi’an
[2] The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang
[3] State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an
[4] Hangzhou Institute of Technology, Xidian University, Hangzhou
来源
Tongxin Xuebao/Journal on Communications | 2024年 / 45卷 / 05期
基金
中国国家自然科学基金;
关键词
algebraic S-box; FPGA implementation; pipeline architecture; SM4; algorithm;
D O I
10.11959/j.issn.1000-436x.2024053
中图分类号
学科分类号
摘要
To address the inefficient data processing performance and excessive resource utilization issues that field-programmable gate array (FPGA)-based SM4 implementations faced, an implementation scheme that adopted both iteration and pipeline in order to reduce resource consumption and improve throughput was proposed. A combination of cyclic key extension and 32 bit pipeline encryption and decryption architecture was adopted by the proposed scheme. The cyclic key extension reduced logical resource consumption, while the 32 bit pipeline encryption and decryption improved data throughput. Additionally, an algebraic S-box that combined linear operations to select an optimal matrix from those generated by different irreducible polynomials was employed. Resource usage and computation overhead was further minimized, thus achieving an increased engineering frequency. Experimental results demonstrate a 43% throughput improvement and a 10% reduction in resource usage compared to the current best scheme. © 2024 Editorial Board of Journal on Communications. All rights reserved.
引用
收藏
页码:140 / 150
页数:10
相关论文
共 50 条
[21]   An efficient architecture for an improved watershed algorithm and its FPGA implementation [J].
Rambabu, C ;
Chakrabarti, I ;
Mahanta, A .
2002 IEEE INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE TECHNOLOGY (FPT), PROCEEDINGS, 2002, :370-373
[22]   A Pipelined FPGA Implementation of an Encryption Algorithm based on Genetic Algorithm [J].
Thirer, Nonel .
MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VII, 2013, 8751
[23]   A White-Box SM4 Implementation by Introducing Pseudo States Applied to Edge IoT Agents [J].
Miao, Weiwei ;
Jin, Chao ;
Zeng, Zeng ;
Bao, Zhejing ;
Wei, Xiaogang ;
Zhang, Rui .
2022 4TH ASIA ENERGY AND ELECTRICAL ENGINEERING SYMPOSIUM (AEEES 2022), 2022, :154-160
[24]   FPGA Implementation of Lifting-Based Data Hiding Scheme for Efficient Quality Access Control of Images [J].
Phadikar, Amit ;
Maity, Goutam Kumar ;
Chiu, Tien-Lung ;
Mandal, Himadri .
CIRCUITS SYSTEMS AND SIGNAL PROCESSING, 2019, 38 (02) :847-873
[25]   An efficient algorithm to construct reduced visibility graph and its FPGA implementation [J].
Priya, TK ;
Sridharan, K .
17TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS: DESIGN METHODOLOGIES FOR THE GIGASCALE ERA, 2004, :1057-1062
[26]   A novel pipeline based FPGA implementation of a genetic algorithm [J].
Thirer, Nonel .
MACHINE INTELLIGENCE AND BIO-INSPIRED COMPUTATION: THEORY AND APPLICATIONS VIII, 2014, 9119
[27]   An efficient attribute-based encryption scheme based on SM9 encryption algorithm for dispatching and control cloud [J].
Ji, Honghan ;
Zhang, Hongjie ;
Shao, Lisong ;
He, Debiao ;
Luo, Min .
CONNECTION SCIENCE, 2021, 33 (04) :1094-1115
[28]   FPGA implementation of FDTD algorithm [J].
Suzuki, Hidetbshi ;
Takagi, Yuta ;
Yamaguchi, Ryo ;
Uebayashi, Shinji .
2005 ASIA-PACIFIC MICROWAVE CONFERENCE PROCEEDINGS, VOLS 1-5, 2005, :3470-3473
[29]   FPGA Implementation of an Adaptive LSB Replacement Based Digital Watermarking Scheme [J].
Roy, Subhrajit Sinha ;
Das, Manisha ;
Basu, Abhishek ;
Chattopadhyay, Avik .
2018 INTERNATIONAL SYMPOSIUM ON DEVICES, CIRCUITS AND SYSTEMS (ISDCS), 2018,
[30]   An FPGA Implementation of Gradient Based Edge Detection Algorithm Design [J].
Yasri, I. ;
Hamid, N. H. ;
Yap, V. V. .
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER TECHNOLOGY AND DEVELOPMENT, VOL 2, 2009, :165-169