Abstract
In the authenticated encryption mode GCM (Galois Counter Mode), the CTR (counter) mode for data encryption that has no feedback path can easily be pipelined to boost the operating frequency of a hardware implementation. However, the hash function for the authentication tag generation performs multiply-add operations sequentially by chaining the result in the previous cycle, and this becomes the critical path in the high-speed GCM hardware. Therefore, we propose a high-speed pipelined hardware architecture for GCM in conjunction with a pipelined multiply-adder on a Galois field GF(2128). This architecture was implemented with a 4-stage pipelined multiply-adder and a 56-stage pipelined AES (Advanced Encryption Standard) circuit by using a 0.13-um CMOS standard cell library. This implementation showed very high throughput of 54.94 Gbps with 272 Kgates for the key lengths of 128, 192, and 256 bits. The high hardware efficiency (throughput/gate) of 201.75 Kbps/gate is also an improvement over prior art.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
McGrew, D., et al.: The Galois/Counter Mode of Operation (GCM) (May 2005), http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/gcm/gcm-revised-spec.pdf
NIST, Recommendation for Block Cipher Modes of Operation: Methods and Techniques, Special Publication 800-38A (December 2001), http://csrc.nist.gov/CryptoToolkit/modes/800-38_Series_Publications/SP800-38A.pdf
NIST, Recommendation for Block Cipher Modes of Operation: Galois/Counter Mode (GCM) for Confidentiality and Authentication, Draft Special Publication 800-38D (April 2006), http://csrc.nist.gov/publications/drafts/Draft-NIST_SP800-38D_Public_Comment.pdf
NIST, Advanced Encryption Standard (AES) FIPS Publication 197 (November 2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Viega, J., et al.: The Use of Galois/Counter Mode (GCM) in IPsec Encapsulating Security Payload (EPS) RFC 4106 (June 2005), http://www.faqs.org/rfcs/rfc4106.htm
IEEE, 802.1AE - Media Access Control (MAC) Security, Draft 3.5 (June 2005), http://www.ieee802.org/1/pages/802.1ae.html
IEEE, P, 1/D12a - Standard for Authenticated Encryption with Length Expansion for Storage Devices (November 2006), http://grouper.ieee.org/groups/1619/email/bin00084.bin
Kohno, T., et al.: Carter Wegman (authentication) with Counter (encryption) (May 2003), http://csrc.nist.gov/CryptoToolkit/modes/proposedmodes/cwc/cwc-spec.pdf
Satoh, A.: High-Speed Hardware Architectures for Authenticated Encryption Mode GCM. In: Proc. IEEE ISCAS 2006, IEEE Computer Society Press, Los Alamitos (2006)
Satoh, A.: High-Speed Parallel Hardware Architecture for Galois Counter Mode. In: IEEE ISCAS 2007, IEEE Computer Society Press, Los Alamitos (2007)
Satoh, A., et al.: A Compact Rijndael Hardware Architecture with S-box Optimization. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 239–254. Springer, Heidelberg (2001)
Yang, B., et al.: High Speed Architecture for Galois/Counter Mode of Operation (GCM), Cryptology ePrint Archive: Report 2005/146 (June 2005), http://eprint.iacr.org/2005/146.pdf
Elliptic Semiconductor Inc, CLP-15/-16/-24 AES-GCM Core Preliminary Data Sheet (2004), http://www.ellipticsemi.com/
IP Cores, Inc., GCM1/GCM2 802.1ae (MACSec) GCM/AES Cores (2006), http://www.ipcores.com/IEEE802.1AE-AES-GCM-Core.htm
IBM Cu-11 Standard Cell / Gate Array ASIC, http://www-03.ibm.com/chips/products/asics/products/cu-11.html
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Satoh, A., Sugawara, T., Aoki, T. (2007). High-Speed Pipelined Hardware Architecture for Galois Counter Mode. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds) Information Security. ISC 2007. Lecture Notes in Computer Science, vol 4779. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75496-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-540-75496-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75495-4
Online ISBN: 978-3-540-75496-1
eBook Packages: Computer ScienceComputer Science (R0)