Performance evaluation of highly efficient techniques for software implementation of LFSR

被引:6
作者
Delgado-Mohatar, Oscar [1 ]
Fuster-Sabater, Amparo [1 ]
Sierra, Jose M. [2 ,3 ]
机构
[1] CSIC, Inst Fis Aplicada, Madrid, Spain
[2] Univ Carlos III Madrid, Dept Informat, Madrid, Spain
[3] Univ Carlos III Madrid, Dept Comp Sci, Madrid, Spain
关键词
D O I
10.1016/j.compeleceng.2011.04.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Linear feedback shift registers (LFSR) are widely used in many different areas. In this paper, we study the operation of LFSR defined over extension fields GF(2(n)), instead of traditional binary fields, quantifying and comparing the theoretical with the real performance improvement. We also examine other techniques for efficient implementation, analyzing the effectiveness of both approaches. The experiments show that speedups up to 10.15 can be easily achieved. Surprisingly, data also show that the use of extension fields greater than GF(2(16)) is not always worth, due to the increasing internal operation costs. The benefits are clear for all possible applications of LFSR, and specifically for cryptographic purposes. (C) 2011 Published by Elsevier Ltd.
引用
收藏
页码:1222 / 1231
页数:10
相关论文
共 23 条
[1]   COMPILER TRANSFORMATIONS FOR HIGH-PERFORMANCE COMPUTING [J].
BACON, DF ;
GRAHAM, SL ;
SHARP, OJ .
ACM COMPUTING SURVEYS, 1994, 26 (04) :345-420
[2]   Computing the correct Increment of Induction Pointers with application to loop unrolling [J].
Ben Asher, Yosi ;
Haj-Yihia, Jawad .
JOURNAL OF SYSTEMS ARCHITECTURE, 2010, 56 (12) :654-666
[3]  
Dan Yong-ping, 2009, Journal of China Universities of Posts and Telecommunications, V16, P72, DOI 10.1016/S1005-8885(08)60206-X
[4]   Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions [J].
Deepthi, P. P. ;
Sathidevi, P. S. .
COMPUTERS & SECURITY, 2009, 28 (3-4) :229-241
[5]   Design and analysis of a highly secure stream cipher based on linear feedback shift register [J].
Deepthi, P. P. ;
John, Deepa Sara ;
Sathidevi, P. S. .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (02) :235-243
[6]  
Eranian S., 2009, THE PERFMON2 PROJECT
[7]  
Golic J. D., 1996, Fast Software Encryption. Third International Workshop Proceedings, P173
[8]  
Golomb Solomon W, 1981, SHIFT REGISTER SEQUE
[9]  
Greenan K. M., 2008, PROC IEEE INT S MODE, P257
[10]  
HERLESTAM T, 1986, LECT NOTES COMPUT SC, V219, P119