RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
نویسندگان
چکیده
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices. Since the outcome likely have significant, long-lived impact, careful evaluation of each submission with respect metrics explicitly outlined in call imperative. Beyond robustness submissions against cryptanalytic attack, related their implementation (e.g., execution latency and memory footprint) form an important example. Aiming provide evidence allowing richer such metrics, this paper presents design, implementation, one separate Instruction Set Extension (ISE) 10 LWC final round submissions, namely Ascon, Elephant, GIFT-COFB, Grain-128AEADv2, ISAP, PHOTON-Beetle, Romulus, Sparkle, TinyJAMBU, Xoodyak; although we base work on use RISC-V, argue that it provides more general insight.
منابع مشابه
Instruction Set Extensions for Pairing-Based Cryptography
A series of recent algorithmic advances has delivered highly effective methods for pairing evaluation and parameter generation. However, the resulting multitude of options means many different variations of base field must ideally be supported on the target platform. Typical hardware accelerators in the form of co-processors possess neither the flexibility nor the scalability to support fields ...
متن کاملThe RISC - V Compressed Instruction Set Manual
Warning! This draft specification may change before being accepted as standard, so implementations made to this draft specification might not conform to the future standard.
متن کاملLight-Weight Instruction Set Extensions for Bit-Sliced Cryptography
Bit-slicing is a non-conventional implementation technique for cryptographic software where an n-bit processor is considered as a collection of n 1-bit execution units operating in SIMD mode. Particularly when implementing symmetric ciphers, the bit-slicing approach has several advantages over more conventional alternatives: it often allows one to reduce memory footprint by eliminating large lo...
متن کاملAccelerating AES Using Instruction Set Extensions for Elliptic Curve Cryptography
The Advanced Encryption Standard (AES) specifies an algorithm for a symmetric-key cryptosystem that has already found wide adoption in security applications. A substantial part of the AES algorithm are the MixColumns and InvMixColumns operations, which involve multiplications in the binary extension field GF(2). Recently proposed instruction set extensions for elliptic curve cryptography (ECC) ...
متن کاملInstruction Set Extensions for Cryptographic Applications
Instruction-set extension (ISE) has been widely studied as a means to improve the performance of microprocessor devices running cryptographic applications. It consists, essentially, in endowing an existing processor with a set of additional instructions that can be useful for speeding-up specific cryptographic computations. Recently, researchers became aware of the following: ”The efficiency of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transactions on cryptographic hardware and embedded systems
سال: 2022
ISSN: ['2569-2925']
DOI: https://doi.org/10.46586/tches.v2023.i1.193-237