High Throughput Parallelization of AES-CTR Algorithm
نویسندگان
چکیده
منابع مشابه
Parallelization of the AES Algorithm
In this paper we present the parallelization process of the AES algorithm (Rijndael) along with the description of exploited parallelization tools. The data dependences analysis of loops and appropriate loop transformations were applied in order to parallelize the sequential algorithm. The OpenMP standard was chosen for representing the parallelism of the AES algorithm. Speed-up measurements fo...
متن کاملFpga Implementations of High Throughput Sequential and Fully Pipelined Aes Algorithm*
In this paper, we use FPGA chips to realize the high throughput 128 bits AES cipher processor with new high-speed and hardware sharing functional blocks. The AES functional calculations include four transformation stages, which are the SubBytes, the ShiftRows, the MixColumns and the AddRoundKey. First, the content-addressable memory(CAM) based scheme is used to realize the proposed pipelined hi...
متن کاملRFC 5930 AES - CTR for IKEv 2 July 2010
This document describes the usage of Advanced Encryption Standard Counter Mode (AES-CTR), with an explicit Initialization Vector, by the Internet Key Exchange version 2 (IKEv2) protocol, for encrypting the IKEv2 exchanges that follow the IKE_SA_INIT exchange. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This docu...
متن کاملVectorized AES Core for High-throughput Secure Environments
Parallelism has long been known to increase the throughput of applications that process independent data. It has been used in a broad range of designs, from functional units to large parallel supercomputers. With the advent of multicore technology designers and programmers are increasingly forced to think in parallel. It is clear that parallelism will be key to the implementation of efficient c...
متن کامل―A High Throughput CFA AES S-Box with Error Correction
The Advanced Encryption Standard (AES) has been lately accepted as the symmetric cryptography standard for confidential data transmission. The AES cipher is specified as a number of repetitions of transformation rounds that convert the input plain-text into the final output of cipher-text. Each round consists of several processing steps, including one that depends on the encryption key. A set o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2013
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.e96.d.1685