A Reconfigurable Block Cryptographic Processor Based on VLIW Architecture

被引:0
作者
LI Wei [1 ,2 ]
ZENG Xiaoyang [1 ]
NAN Longmei [1 ]
CHEN Tao [2 ]
DAI Zibin [2 ]
机构
[1] State Key Lab of ASIC and System,Fudan University
[2] Institute of Information Science and Technology
基金
中国国家自然科学基金;
关键词
Block Cipher; VLIW processor; reconfigurable; application-specific instruction-set;
D O I
暂无
中图分类号
TN918.4 [密码的加密与解密];
学科分类号
0839 ; 1402 ;
摘要
An Efficient and flexible implementation of block ciphers is critical to achieve information security processing.Existing implementation methods such as GPP,FPGA and cryptographic application-specific ASIC provide the broad range of support.However,these methods could not achieve a good tradeoff between high-speed processing and flexibility.In this paper,we present a reconfigurable VLIW processor architecture targeted at block cipher processing,analyze basic operations and storage characteristics,and propose the multi-cluster register-file structure for block ciphers.As for the same operation element of block ciphers,we adopt reconfigurable technology for multiple cryptographic processing units and interconnection scheme.The proposed processor not only flexibly accomplishes the combination of multiple basic cryptographic operations,but also realizes dynamic configuration for cryptographic processing units.It has been implemented with0.18μm CMOS technology,the test results show that the frequency can reach 350 MHz.and power consumption is 420 mw.Ten kinds of block and hash ciphers were realized in the processor.The encryption throughput of AES,DES,IDEA,and SHA-1 algorithm is1554 Mbps,448Mbps,785 Mbps,and 424 Mbps respectively,the test result shows that our processor’s encryption performance is significantly higher than other designs.
引用
收藏
页码:91 / 99
页数:9
相关论文
共 9 条
  • [1] CryptoManiac:A fast flexible architecture for secure communication. Wu Lisa,Weaver C,Austin T. The 28th Annual International Symposium on Computer Architecture . 2001
  • [2] Asynchronous PipeRench: architecture and performance evaluations. H. Kagotani,H. Schmit. The 11th Annual IEEE Symposium on Field- Programmable Custom Computing Machines . 2003
  • [3] DES,FIPS,Federal Information Processing Standard. http://csrc.nist.gov/ps/change81 .
  • [4] Recommendation for Block Cipher Modes of Operation,NIST Special Publication SP 800-38A. http://csrc.nist.gov/publications/nistpubs/index.html .
  • [5] An instruction-level distributed processor for symmetric-key cryptography. Elbirt, Adam J,Paar, Christof. IEEE Transactions on Parallel and Distributed Systems . 2005
  • [6] Enhancing the Performance of Symmetric-Key Cryptography via Instruction Set Extensions. Sean O’’Melia,Adam J Elbirt. IEEE Transactions on Very Large Scale Integration System . 2010
  • [7] A low-complexity heterogeneous multi-core platform for security SoC. Huang Wei,Han Jun,Wang Shuai. IEEE Asian Solid-State Circuits Conference . 2010
  • [8] Advanced Encryption Standard. http://www.nist.gov/aes .
  • [9] CRYPTONITE:A Programmable Crypto Processor Architecture For High-Bandwidth Applications. Rainer Buchty. Institute fur tnformatik der Technischen Universitat Munchen . 2002