skip to main content
article

An adaptive cryptographic engine for internet protocol security architectures

Published: 01 July 2004 Publication History

Abstract

Architectures that implement the Internet Protocol Security (IPSec) standard have to meet the enormous computing demands of cryptographic algorithms. In addition, IPSec architectures have to be flexible enough to adapt to diverse security parameters. This article proposes an FPGA-based Adaptive Cryptographic Engine (ACE) for IPSec architectures. By taking advantage of FPGA technology, ACE can adapt to diverse security parameters on the fly while providing superior performance compared with software-based solutions. In this paper, we focus on performance issues. A diverse set of private-key cryptographic algorithms is utilized to demonstrate the applicability of the proposed cryptographic engine. The time performance metrics are throughput and key-setup latency. The latency metric is the most important measure for IPSec where a small amount of data is processed per key and key context switching occurs repeatedly. We are not aware of any published results that include extensive key-setup latency results.

References

[1]
AES. Advanced encryption standard. http://csrc.nist.gov/encryption/aes/.]]
[2]
Anderson, R., Biham, E., and Knudsen, L. 1998. Serpent: A proposal for the advanced encryption standard. Tech. rep., NIST AES Proposal (June).]]
[3]
Aoki, K. and Lipmaa, H. 2000. Fast implementations of aes candidates. In Proceedings of the 3rd AES Candidate Conference.]]
[4]
Bassham L. E. III. 2000. Efficiency testing of ANSI C implementations of round 2 candidate algorithms for the advanced encryption standard. In Proceedings of the 3rd AES Candidate Conference.]]
[5]
Brown, S. and Rose, J. 1996. FPGA and CPLD architectures: A tutorial. In Proceedings of the IEEE Design & Test of Computers.]]
[6]
Burwick, C. et al. 1999. Mars---A candidate cipher for AES. Tech. Rep., NIST AES Proposal (Aug.).]]
[7]
Chu, Y. J. and Liu, T. H. 1965. On the shortest arborescence of a directed graph. Sci. Sin. 14, 1396--1400.]]
[8]
Cisco Systems, Inc. IPSEC. http://www.cisco.com/public/products_tech.shtml.]]
[9]
Daemen, J. and Rijmen, V. 1999. The rijndael block cipher. Tech. Rep., NIST AES Proposal (Sept.).]]
[10]
Dandalis, A. 2001. Dynamic logic synthesis for reconfigurable hardware. Ph.D. dissertation, Dept. of Electrical Engineering, University of Southern California.]]
[11]
Dandalis, A., Mei, A., and Prasanna, V. K. 1999. Domain specific mapping for solving graph problems on reconfigurable devices. In Proceedings of the Reconfigurable Architectures Workshop.]]
[12]
Dandalis, A. and Prasanna, V. K. 2001. Configuration compression for FPGA-based embedded systems. In Proceedings of the International Symposium on Field-Programmable Gate Arrays.]]
[13]
Dowd, P. and McHenry, J. T. 1998. Network security: It's time to take it seriously. IEEE Computer 31, 9 (Sept.), 24--28.]]
[14]
Edmonds, J. 1967. Optimum branchings. J. Res. N&S 71(B), 233--240.]]
[15]
Elbirt, A. J., Yip, W., Chetwynd, B., and Paar, C. 2000. An FPGA implementation and performance evaluation of the aes block cipher candidate algorithm finalists. In Proceedings of the 3rd AES Candidate Conference.]]
[16]
Farrahi, A. and Sarrafzadeh, M. 1994. Complexity of the lookup-table minimization problem for fpga technology mapping. IEEE Trans. Comput. Aid. Des. 13, 11 (Nov.), 1319--1332.]]
[17]
Fowler, D. 1999. Virtual Private Networks: Making the Right Connection. Morgan-Kaufmann, San Francisco, Calif.]]
[18]
Gaj, K. and Chodowiec, P. 2000. Comparison of the hardware performance of the AES candidates using reconfigurable hardware. In Proceedings of the 3rd AES Candidate Conference.]]
[19]
Gokhale, M. and Gomersall, E. 1997. High level compilation for fine grained fpgas. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines.]]
[20]
Hadley, J. D. and Hutchings, B. L. 1995. Design methodologies for partially reconfigured systems. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines.]]
[21]
Hudson, R. D., Lehn, D. I., and Athanas, P. 1998. A run-time reconfigurable engine for image interpolation. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines.]]
[22]
Kim, H., Somani, A. K., and Tyagi, A. 2001. A reconfigurable multi-function computing cache architecture. In Proceedings of the IEEE Trans. VSLI Syst. 9, 4 (Aug.), 509--523.]]
[23]
Klimesh, M., Stanton, V., and Watola, D. 2001. Hardware implementation of a lossless image compression algorithm using a field programmable gate array. Tech. Rep., Jet Propulsion Laboratory, California Institute of Technology: The Telecommunications and Mission Operations Progress Report (Feb.).]]
[24]
McHenry, J. T., Dowd, P. W., Pellegrino, F. A., Carrozzi, T. M., and Cocks, W. B. 1997. An fpga-based coprocessor for ATM firewalls. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines.]]
[25]
McMillan, S. and Patterson, C. 2001. Jbits implementations of the advanced encryption standard (rijndael). In Proceedings of the International Conference on Field Programmable Logic and Applications.]]
[26]
Periyayacheri, S., Nayak, A., Jones, A., Shenoy, N., Choudhary, A., and Banerjee, P. 1999. Library functions in reconfigurable hardware for matrix and signal processing operations in matlab. In Proceedings of the Parallel and Distributed Computing and Systems Conference.]]
[27]
Rivest, R. L., Robshaw, M. J. B., Sidney, R., and Yin, T. L. 1998. The RC6 block cipher. Tech. Rep., NIST AES Proposal (June).]]
[28]
Rose, J., Gamal, A., and Sangiovanni-Vincentelli, A. 1993. Architecture of field programmable gate arrays. Proc. IEEE.]]
[29]
Schneier, B. 1996. Applied Cryptography, 2nd ed. Willey, New York.]]
[30]
Schneier B. et al. 1998. Twofish: A 128-bit block cipher. Tech. Rep., NIST AES Proposal (June).]]
[31]
Swanchara, S., Harper, S., and Athanas, P. 1998. A stream-based configurable computing radio testbed. In Proceedings of the IEEE Symposium on Field-Programmable Custom Computing Machines.]]
[32]
Taylor, R. R. and Goldstein, S. C. 1999. A high-performance flexible architecture for cryptography. In Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems.]]
[33]
Villasenor, J. and Mangione-Smith, W. H. 1997. Configurable computing. Sci. Amer., 66--71.]]
[34]
Weeks, B., Bean, M., Rozylowicz, T., and Ficke, C. 2000. Hardware performance simulations of round 2 advanced encryption standard algorithms. In Proceedings of the 3rd AES Candidate Conference.]]
[35]
Xilinx. Xilinx virtex series fpgas. http://www.xilinx.com/products/virtex.htm.]]
[36]
Xilinx JBits. Xilinx jbits sdk. http://www.xilinx.com/products/jbits.]]

Cited By

View all
  • (2017)Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGAJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2016.01.00429:3(295-302)Online publication date: Jul-2017
  • (2016)PIPSEAProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978329(1255-1267)Online publication date: 24-Oct-2016
  • (2012)Reconfigurable Computing—A New ParadigmComputer Technology and Computer Programming10.1201/b13124-8(111-124)Online publication date: 17-Oct-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Design Automation of Electronic Systems
ACM Transactions on Design Automation of Electronic Systems  Volume 9, Issue 3
July 2004
112 pages
ISSN:1084-4309
EISSN:1557-7309
DOI:10.1145/1013948
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Journal Family

Publication History

Published: 01 July 2004
Published in TODAES Volume 9, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. AES
  2. Adaptive computing
  3. IPSec
  4. configurable
  5. cryptography
  6. high performance
  7. performance tradeoffs
  8. reconfigurable components
  9. reconfigurable computing
  10. reconfigurable systems

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Comparative analysis of different AES implementation techniques for efficient resource usage and better performance of an FPGAJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2016.01.00429:3(295-302)Online publication date: Jul-2017
  • (2016)PIPSEAProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978329(1255-1267)Online publication date: 24-Oct-2016
  • (2012)Reconfigurable Computing—A New ParadigmComputer Technology and Computer Programming10.1201/b13124-8(111-124)Online publication date: 17-Oct-2012
  • (2012)Transaction-based authentication and key agreement protocol for inter-domain VoIPJournal of Network and Computer Applications10.1016/j.jnca.2012.02.01035:5(1579-1597)Online publication date: 1-Sep-2012
  • (2011)CIPHER BLOCK BASED AUTHENTICATION MODULE: A HARDWARE DESIGN PERSPECTIVEJournal of Circuits, Systems and Computers10.1142/S021812661100718920:02(163-184)Online publication date: Apr-2011
  • (2011)Security FPGA AnalysisSecurity Trends for FPGAS10.1007/978-94-007-1338-3_2(7-46)Online publication date: 2011
  • (2010)HW/SW Co-design Integrating High-Speed Authentication Module for IPSec/IPv6Proceedings of the 2010 Fifth International Conference on Digital Telecommunications10.1109/ICDT.2010.33(138-142)Online publication date: 13-Jun-2010
  • (2009)Software and hardware design of a multi-cipher cryptosystemTENCON 2009 - 2009 IEEE Region 10 Conference10.1109/TENCON.2009.5396161(1-5)Online publication date: Nov-2009
  • (2009)A Top-Down Design Methodology for Ultrahigh-Performance Hashing CoresIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2008.156:4(255-268)Online publication date: 1-Oct-2009
  • (2008)Design of a novel hardware data structure for cryptographic applicationsProceedings of the WSEAS International Conference on Applied Computing Conference10.5555/1415804.1415840(194-198)Online publication date: 27-May-2008
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media