skip to main content
10.1145/2768566.2768574acmconferencesArticle/Chapter ViewAbstractPublication PageshaspConference Proceedingsconference-collections
short-paper

Hardware overhead analysis of programmability in ARX crypto processing

Published: 14 June 2015 Publication History

Abstract

This paper evaluates the area and performance overhead of a programmable cryptographic accelerator specialized to support ARX (Add, Rotate, and Xor) based encryption standards, which are common in symmetric cryptography. This overhead is measured by comparing to a variety of custom ARX implementations optimized specifically for π -- Cipher. This is a new algorithm for authenticated encryption that offers advantages over AES-GCM and is a candidate in the CAESAR competition. The programmable processor is designed to accommodate different word sizes, different block sizes and different security levels. The custom variants require separate versions to support these diverse capabilities. We find that the overhead of the programmability is quite high. For example, we implemented the Programmable Processing Element PPE in 227 slices, achieving a throughput of about 1.2 Gbps/block, regardless of the word size. In comparison, our best custom 64-bit implementation so far requires 445 slices, achieving 3.09 Gbps. This means that two PPEs running in parallel can achieve 75% of the throughput of the custom 64-bit solution, while providing flexibility to support diverse cryptographic standards.

References

[1]
D. J. Bernstein, "Caesar: Competition for authenticated encryption: Security, applicability, and robustness," CAESAR web page, 2013, http://competitions.cr.yp.to/index.html.
[2]
M. El-Hadedy, K. Skadron, H. Mihajloska, and D. Gligoroski, "Area Programmable Processing Element for Crypto-Systems on FPGAs," in Proceedings of the International Symposium on High-Efficient Accelerators and Reconfigurable Technologies, HEART2015, June 2015.
[3]
D. Gligoroski, H. Mihajloska, S. Samardjiska, H. Jacobsen, M. El-Hadedy, and R. E. Jensen, "π-cipher v1," Cryptographic competitions: CAESAR, 2014, http://competitions.cr.yp.to/caesar-submissions.html.
[4]
D. Gligoroski, H. Mihajloska, S. Samardjiska, H. Jacobsen, R. E. Jensen, and M. El-Hadedy, "π-cipher: Authenticated encryption for big data," in Secure IT Systems - 19th Nordic Conference, NordSec 2014, Tromsø, Norway, October 15-17, 2014, Proceedings, ser. Lecture Notes in Computer Science, K. Bernsmed and S. Fischer-Hübner, Eds., vol. 8788. Springer, 2014, pp. 110--128. {Online}. Available: http://dx.doi.org/10.1007/978-3-319-11599-3_7
[5]
S. Kao, R. Zlatanovici, and B. Nikolic, "A 240ps 64b carry-lookahead adder in 90nm cmos," in Solid-State Circuits Conference, 2006. ISSCC 2006. Digest of Technical Papers. IEEE International, Feb 2006, pp. 1735--1744.

Cited By

View all
  • (2022)ReaLSE: Reconfigurable Lightweight Security Engines for Trusted Edge Devices2022 IEEE 4th International Conference on Circuits and Systems (ICCS)10.1109/ICCS56666.2022.9936234(7-12)Online publication date: 23-Sep-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HASP '15: Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy
June 2015
72 pages
ISBN:9781450334839
DOI:10.1145/2768566
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 June 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CAESAR
  2. FPGA
  3. crypto-systems
  4. encryption

Qualifiers

  • Short-paper

Funding Sources

Conference

ISCA '15
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)ReaLSE: Reconfigurable Lightweight Security Engines for Trusted Edge Devices2022 IEEE 4th International Conference on Circuits and Systems (ICCS)10.1109/ICCS56666.2022.9936234(7-12)Online publication date: 23-Sep-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media