RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

نویسندگان

چکیده

The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices. Since the outcome likely have significant, long-lived impact, careful evaluation of each submission with respect metrics explicitly outlined in call imperative. Beyond robustness submissions against cryptanalytic attack, related their implementation (e.g., execution latency and memory footprint) form an important example. Aiming provide evidence allowing richer such metrics, this paper presents design, implementation, one separate Instruction Set Extension (ISE) 10 LWC final round submissions, namely Ascon, Elephant, GIFT-COFB, Grain-128AEADv2, ISAP, PHOTON-Beetle, Romulus, Sparkle, TinyJAMBU, Xoodyak; although we base work on use RISC-V, argue that it provides more general insight.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Instruction Set Extensions for Pairing-Based Cryptography

A series of recent algorithmic advances has delivered highly effective methods for pairing evaluation and parameter generation. However, the resulting multitude of options means many different variations of base field must ideally be supported on the target platform. Typical hardware accelerators in the form of co-processors possess neither the flexibility nor the scalability to support fields ...

متن کامل

The RISC - V Compressed Instruction Set Manual

Warning! This draft specification may change before being accepted as standard, so implementations made to this draft specification might not conform to the future standard.

متن کامل

Light-Weight Instruction Set Extensions for Bit-Sliced Cryptography

Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in SIMD mode. Particularly when implementing symmetric ciphers, the bit-slicing approach has several advantages over more conventional alternatives: it often allows one to reduce memory footprint by eliminating large lo...

متن کامل

Accelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography

The Advanced Encryption Standard (AES) specifies an algorithm for a symmetric-key cryptosystem that has already found wide adoption in security applications. A substantial part of the AES algorithm are the MixColumns and InvMixColumns operations, which involve multiplications in the binary extension field GF(2). Recently proposed instruction set extensions for elliptic curve cryptography (ECC) ...

متن کامل

Instruction Set Extensions for Cryptographic Applications

Instruction-set extension (ISE) has been widely studied as a means to improve the performance of microprocessor devices running cryptographic applications. It consists, essentially, in endowing an existing processor with a set of additional instructions that can be useful for speeding-up specific cryptographic computations. Recently, researchers became aware of the following: ”The efficiency of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems

سال: 2022

ISSN: ['2569-2925']

DOI: https://doi.org/10.46586/tches.v2023.i1.193-237