CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers

نویسندگان

  • Dimitris Theodoropoulos
  • Alexandros Siskos
  • Dionisios N. Pnevmatikatos
چکیده

In this paper, we present CCProc, a flexible cryptography coprocessor for symmetric-key algorithms. Based on an extensive analysis of many symmetric-key ciphers, including the five AES finalists, we designed an Instruction Set Architecture tailored to symmetric-key ciphers and built a hardware processor prototype by using the VHDL language. The design was mapped on FPGAs and ASIC. Results show a small-area design, while also supporting many ciphers. Besides flexibility, a 4-core FPGA design can achieve up to 615 Mbits/sec at 95 MHz for Rijndael.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CCproc: An Efficient Cryptographic Coprocessor

In this paper we introduce CCproc, a symmetric-key cryptographic (co)processor with a custom instruction set optimized for cryptographic applications. We study ten popular crypto algorithms, and provide custom solutions for them, while we also offer general support for future encryption algorithms. We design a custom but simple datapath able to execute the proposed instruction set and analyze i...

متن کامل

Block Ciphers and Stream Ciphers: The State of the Art

In these lecture notes we survey the state of the art in symmetric key encryption, in particular in the block ciphers and stream ciphers area. The areas of symmetric key encryption has been very active in the last five years due to growing interest from academic and industry research, standardization efforts like AES, NESSIE and CRYPTREC, as well as due to ease of government control over export...

متن کامل

7.4.1.2 Block Ciphers

Ciphers can be classified into two groups, based on the nature of the key. The family we’ll be talking about is symmetric-key the same key is used to encrypt and decrypt the data. There is a second family, called asymmetric-key cryptography. In assymetric key cryptography, the sender uses one key to encrypt and second to decrypt. Discussion and analysis of assymetric-key cryptography is beyond ...

متن کامل

CryptoGraphics: Secret Key Cryptography Using Graphics Cards

We investigate the feasibility of using Graphics Processing Units (GPUs) for cryptographic processing by exploiting the ability for GPUs to simultaneously process large quantities of pixels to offload symmetric key encryption from the main processor. We demonstrate the use of GPUs for applying the key stream when using stream ciphers. We investigate the use of GPUs for block ciphers, discuss op...

متن کامل

Arbitrary Bit Permutations in One or Two Cycles

Symmetric-key block ciphers encrypt data, providing data confidentiality over the public Internet. For inter-operability reasons, it is desirable to support a variety of symmetric-key ciphers efficiently. We show the basic operations performed by a variety of symmetric-key cryptography algorithms. Of these basic operations, only bit permutation is very slow using existing processors, followed b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009