Performance Comparison of the AES Submissions

نویسندگان

  • Bruce Schneier
  • John Kelsey
  • Doug Whiting
  • David Wagner
  • Chris Hall
  • Niels Ferguson
چکیده

The principal goal guiding the design of any encryption algorithm must be security. In the real world, however, performance and implementation cost are always of concern. Making the assumption that the major AES candidates are secure (a big assumption, to be sure, but one that is best dealt with in another paper), the most important properties the algorithms will be judged on will be the performance and cost of implementation. In this paper, we will completely ignore security. Instead, we will compare the performance of the leading AES candidates on a variety of common platforms: 32-bit CPUs, 64-bit CPUs, cheap 8-bit smart-card CPUs, and dedicated hardware. For each platform, we first make some general observations on the performance issues for each of the platforms, then compare the various AES candidates, and finally look at the specific issues for each of the candidates.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

NIST Performance Analysis of the Final Round JavaTM AES Candidates

NIST solicited candidate algorithms for the Advanced Encryption Standard (AES) in a Federal Register Announcement dated September 12, 1997[1]. Fifteen of the submissions were deemed “complete and proper” as defined in the Announcement, and entered the first round of the AES selection process in August 1998. Since that time, NIST has been working with a worldwide community of cryptographers to e...

متن کامل

Reporting quality of submissions to the National Conferences on Electronic Learning in Medical Education: implications from Iranian research performance

Background: Reporting quality of research on medical education has come under scrutiny in recent years in wake of empirical evidence. Poor reporting quality of published abstracts may distract readers from careful reading of research evidence or in a worst case mislead scientists. Main objective of this study was to evaluate the extent and quality of the submitted abstracts to the 3rd and 4th N...

متن کامل

AES Finalists on PA-RISC and IA-64: Implementations & Performance

The Advanced Encryption Standard selection process has, for the first time, included software execution speed as a relevant criterion for the choice of the next standard. The initial submissions included keying, encryption, and decryption execution times, in clock cycles, for Intel Pentium, Pentium II, and Pentium Pro microprocessors. While Pentium execution speeds are important, by no means do...

متن کامل

The Intel AES Instructions Set and the SHA-3 Candidates

The search for SHA-3 is now well-underway and the 51 accepted submissions reflect a wide variety of design approaches. A significant number are built around Rijndael/AES-based operations and, in some cases, the AES round function itself. Many of the design teams have pointed to the forthcoming Intel AES instructions set, to appear on Westmere chips during 2010, when making a variety of performa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999