A Hardware-efficient Implementation of CLOC for On-Chip Authenticated Encryption

被引:0
作者
Elmohr, Mahmoud A. [1 ]
Kumar, Sachin [2 ]
Khairallah, Mustafa [3 ]
Chattopadhyay, Anupam [2 ]
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON, Canada
[2] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore, Singapore
[3] Nanyang Technol Univ, Sch Phys & Math Sci, Singapore, Singapore
来源
2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI) | 2018年
关键词
AES; Authenticated Encryption; ASIC implementation; Technology mapping; logic optimization;
D O I
10.1109/ISVLSI.2018.00064
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the huge number of candidates for the CAESAR competition for authenticated encryption, the task of designing efficient implementations for these candidates becomes a big challenge. The main goal of this competition is to find smaller, faster, energy-efficient and secure authenticated encryption schemes. In this paper, an area efficient hardware implementation of CLOC, one of the 15 candidates for the third round of CAESAR competition is presented. CLOC represents a new mode of using AES, in order to provide both encryption/decryption and MAC functionalities. Since the hardware design of AES is a well studied problem, the challenge is to accommodate the mode functionality with small area, high performance and low power overhead. The proposed hardware implementation for the CLOC is developed by sharing the AES core by applying a pipeline technique. By using commercial synthesis flows and 65 nm ASIC technology, it shows, for low power applications, that proposed hardware architecture of CLOC reduces the area by 42.85% and consumes 37.8% less power when compared with the existing high throughput implementation of CLOC. In addition, area efficiency of the proposed design is also improved by 17.6% and the proposed design consumes only 2.6 mu W.
引用
收藏
页码:311 / 315
页数:5
相关论文
共 10 条
[1]  
[Anonymous], INT WORKSH FAST SOFT
[2]  
[Anonymous], 2016, IMPLEMENTERS GUIDE C
[3]  
Banik S, 2016, PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST), P71, DOI 10.1109/HST.2016.7495559
[4]   Authenticated encryption: Relations among notions and analysis of the generic composition paradigm [J].
Bellare, Mihir ;
Namprempre, Chanathip .
JOURNAL OF CRYPTOLOGY, 2008, 21 (04) :469-491
[5]  
Dworkin Morris J., 2007, TECH REP
[6]  
George Mason University, 2017, ATHENA AUT TOOLS HAR ATHENA AUT TOOLS HAR
[7]  
Kohno T., 2003, The CWC Authenticated Encryption (associated data) Mode
[8]  
McGrew DA, 2004, LECT NOTES COMPUT SC, V3348, P343
[9]  
Rogaway P., 2003, ACM Transactions on Information and Systems Security, V6, P365, DOI 10.1145/937527.937529
[10]  
Suzaki T., 2013, P INT C SEL ARE CRYP, V7707, P339, DOI 10. 1007/978- 3- 642-35999-6