Performance Comparison of the AES Submissions
نویسندگان
چکیده
The principal goal guiding the design of any encryption algorithm must be security. In the real world, however, performance and implementation cost are always of concern. Making the assumption that the major AES candidates are secure (a big assumption, to be sure, but one that is best dealt with in another paper), the most important properties the algorithms will be judged on will be the performance and cost of implementation. In this paper, we will completely ignore security. Instead, we will compare the performance of the leading AES candidates on a variety of common platforms: 32-bit CPUs, 64-bit CPUs, cheap 8-bit smart-card CPUs, and dedicated hardware. For each platform, we first make some general observations on the performance issues for each of the platforms, then compare the various AES candidates, and finally look at the specific issues for each of the candidates.
منابع مشابه
NIST Performance Analysis of the Final Round JavaTM AES Candidates
NIST solicited candidate algorithms for the Advanced Encryption Standard (AES) in a Federal Register Announcement dated September 12, 1997[1]. Fifteen of the submissions were deemed “complete and proper” as defined in the Announcement, and entered the first round of the AES selection process in August 1998. Since that time, NIST has been working with a worldwide community of cryptographers to e...
متن کاملReporting quality of submissions to the National Conferences on Electronic Learning in Medical Education: implications from Iranian research performance
Background: Reporting quality of research on medical education has come under scrutiny in recent years in wake of empirical evidence. Poor reporting quality of published abstracts may distract readers from careful reading of research evidence or in a worst case mislead scientists. Main objective of this study was to evaluate the extent and quality of the submitted abstracts to the 3rd and 4th N...
متن کاملAES Finalists on PA-RISC and IA-64: Implementations & Performance
The Advanced Encryption Standard selection process has, for the first time, included software execution speed as a relevant criterion for the choice of the next standard. The initial submissions included keying, encryption, and decryption execution times, in clock cycles, for Intel Pentium, Pentium II, and Pentium Pro microprocessors. While Pentium execution speeds are important, by no means do...
متن کاملThe Intel AES Instructions Set and the SHA-3 Candidates
The search for SHA-3 is now well-underway and the 51 accepted submissions reflect a wide variety of design approaches. A significant number are built around Rijndael/AES-based operations and, in some cases, the AES round function itself. Many of the design teams have pointed to the forthcoming Intel AES instructions set, to appear on Westmere chips during 2010, when making a variety of performa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999