Pipelined Hardware Implementation of COPA, ELmD, and COLM

被引:5
|
作者
Bossuet, Lilian [1 ]
Mancillas-Lopez, Cuauhtemoc [2 ]
Ovilla-Martinez, Brisbane [2 ]
机构
[1] Univ Lyon, UMR CNRS 5516, Lab Hubert Curien, F-42000 St Etienne, France
[2] Cinvestav IPN, Ctr Res & Adv Studies, Natl Polytech Inst Mexico, Dept Comp Sci, Mexico City 07360, DF, Mexico
关键词
Encryption; Ciphers; Authentication; Privacy; Hardware; CAESAR competition; authenticated encryption; AES; COLM; COPA; ELmD; FPGA; pipeline; AUTHENTICATED-ENCRYPTION;
D O I
10.1109/TC.2020.2977031
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Authenticated encryption algorithms offer privacy, authentication, and data integrity, as well. In recent years, they have received special attention after the call for submissions of Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) was published. The CAESAR goal is to generate a portfolio with recommendations of authenticated encryption algorithms for three different scenarios: Lightweight, high speed, and defense in deep. ELmD and COPA are two on-line authenticated encryption algorithms submitted to CAESAR; because of their similarities, they were merged as COLM during the third-round of CAESAR. COLM is a finalist in the use case 3 defense in depth. ELmD, COPA, and COLM are based on the ECB-mix-ECB structure, which is highly parallelizable and pipelineable. In this paper, we present optimized single-chip implementations of ELmD, COPA, and COLM using pipelining. For ELmD, we present implementations for eight combinations of its parameters set: For intermediate tags, fixed, variable tag length, and 10 and 6 AES rounds. COLM implementation is for variable tag length without intermediate tags. In the case of COPA, it does not have parameters set. The implementation results with a Xilinx Virtex 6 FPGA show that ELmD is the best option concerning area and speed for single-chip implementation. The area of COPA and COLM are 1.65 and 1.69 times ELmD's respectively. Regarding throughput, the range of our implementations goes from 33.34 Gbits/s for COLM to more than 35 Gbits/s for several versions of ELmD.
引用
收藏
页码:1533 / 1543
页数:11
相关论文
共 50 条
  • [1] ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
    Bossuet, Lilian
    Datta, Nilanjan
    Mancillas-Lopez, Cuauhtemoc
    Nandi, Mridul
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (11) : 3318 - 3331
  • [2] A Flexible Gimli Hardware Implementation in FPGA and Its Application to RFID Authentication Protocols
    Khan, Safiullah
    Lee, Wai-Kong
    Hwang, Seong Oun
    IEEE ACCESS, 2021, 9 : 105327 - 105340
  • [3] Lightweight implementation of SILC, CLOC, AES-JAMBU and COLM authenticated ciphers
    Jahanbani, Mohsen
    Bagheri, Nasour
    Norozi, Zeinolabedin
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 72
  • [4] DPA Protected Implementation of OCB and COLM Authenticated Ciphers
    Jahanbani, Mohsen
    Norozi, Zeinolabedin
    Bagheri, Nasour
    IEEE ACCESS, 2019, 7 : 139815 - 139826
  • [5] A Pipelined Camellia Architecture for Compact Hardware Implementation
    Kavun, Elif Bilge
    Yalcin, Tolga
    21ST IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2010,
  • [6] Configurable Hardware Implementation of a Pipelined DNLMS Adaptive Filter
    Lee, Raymond
    Khalid, Mohammed A. S.
    Abdel-Raheem, Esam
    2014 26TH INTERNATIONAL CONFERENCE ON MICROELECTRONICS (ICM), 2014, : 9 - 12
  • [7] Implementation of Pipelined Hardware Architecture for AES Algorithm using FPGA
    Kumar, J. Senthil
    Mahalakshmi, C.
    2014 INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORK TECHNOLOGIES (ICCNT), 2014, : 260 - 264
  • [8] Parallelized and pipelined hardware implementation of computationally expensive prediction filters
    Gracia, Luis
    Perez-Vidal, Carlos
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2009, 21 (18) : 2478 - 2490
  • [9] HIGH THROUGHPUT PIPELINED HARDWARE IMPLEMENTATION OF THE KECCAK HASH FUNCTION
    Mestiri, Hassen
    Kahri, Fatma
    Bedoui, Mouna
    Bouallegue, Belgacem
    Machhout, Mohsen
    2016 INTERNATIONAL SYMPOSIUM ON SIGNAL, IMAGE, VIDEO AND COMMUNICATIONS (ISIVC), 2016, : 282 - 286
  • [10] Hardware Implementation of Authenticated Ciphers for Embedded Systems
    Martinez-Rodriguez, Macarena C.
    Sauro, Sergio
    Brox, Piedad
    Sanchez-Solano, Santiago
    IEEE LATIN AMERICA TRANSACTIONS, 2020, 18 (09) : 1581 - 1591