FPGA Implementation of HS1-SIV

被引:1
作者
Geltink, Gerben [1 ]
Volokitin, Sergei [1 ]
机构
[1] Radboud Univ Nijmegen, Inst Comp & Informat Sci, Toernooiveld 212, Nijmegen, Netherlands
来源
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4 | 2016年
关键词
HS1-SIV; CAESAR; Authenticated Encryption; FPGA; VHDL;
D O I
10.5220/0005950100410048
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work describes a hardware implementation of HS1-SIV with regular cipher parameter settings for the second round of the CAESAR competition. The implementation encompasses both the HS1-SIV hardware implementation, which is conforming to the specifications of the authenticated cipher, as well as a hardware API. The implemented API is conforming to the specifications of the GMU Hardware API for authenticated ciphers. On the target device Xilinx Virtex-7, using Xilinx XST High Level Synthesis, we achieved a throughput of 122.20 Mbit/s and an area of 103,214 LUTs with the data length of the message and the associated data set at 64 bytes and the data length of the key set at 32 bytes. Our performance results suggest that the area overhead of the API is between 8% (8-byte data length) and 15% (2048-byte data length) in comparison the the cipher-core.
引用
收藏
页码:41 / 48
页数:8
相关论文
共 14 条
[1]   Compact Hardware Implementations of ChaCha, BLAKE, Threefish, and Skein on FPGA [J].
At, Nuray ;
Beuchat, Jean-Luc ;
Okamoto, Eiji ;
San, Ismail ;
Yamazaki, Teppei .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (02) :485-498
[2]  
BABBAGE S, 2008, ESTREAM PORTFOLIO ES
[3]  
Bernstein D. J., 2008, WORKSH SASC STAT ART, V8
[4]  
Bernstein D. J., 2016, CAESAR COMPETITION A
[5]  
Bertoni Guido., 2011, Submission to NIST (Round 3), V6, P16
[6]  
Biryukov A., 2015, ARGON AND ARGON2
[7]  
Cryptographic Engineering Research Group (CERG) at GMU, 2016, ATHENA DAT RES
[8]  
Daemen J, 1999, AES PROPOSAL RIJNDAE
[9]  
Homsirikamol E., 2015, 2015669 CRYPT EPRINT
[10]  
Kotegawa Makoto., 2016, Bulletin of Networking, Computing, Systems, and Software, V5, P26