ASIC Performance Comparison for the ISO Standard Block Ciphers

نویسندگان

  • Takeshi Sugawara
  • Naofumi Homma
  • Takafumi Aoki
  • Akashi Satoh
چکیده

This paper presents performance comparisons of the ISO/IEC 18033 standard block ciphers, AES, Camellia, SEED, TDEA, MISTY1, and CAST-128 in ASIC hardware. All the algorithms are implemented with a loop architecture where one round function block is used iteratively, and Sboxes are generated from lookup tables. In addition to the straightforward implementations, compact data path architectures were designed for SEED and MISTY1 using the characteristics of nested round functions. For the compact AES and Camellia circuits, composite field S-boxes were also used in addition to the lookup table S-box. All of the designs were synthesized by using a 0.18-μm CMOS standard cell library, and the sizes and speeds were evaluated. The highest throughput of 3.35 Gbps with 75.8 Kgates was obtained by the 128-bit block cipher AES, and the 64-bit block cipher TDEA showed the smallest gate counts of 4.6 Kgates with 228 Mbps.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

64-bit Block ciphers: hardware implementations and comparison analysis

A performance comparison for the 64-bit block cipher (Triple-DES, IDEA, CAST-128, MISTY1, and KHAZAD) FPGA hardware implementations is given in this paper. All these ciphers are under consideration from the ISO/IEC 18033-3 standard in order to provide an international encryption standard for the 64-bit block ciphers. Two basic architectures are implemented for each cipher. For the non-feedback ...

متن کامل

Lightweight cryptography: cryptographic engineering for a pervasive world

Increasingly, everyday items are enhanced to pervasive devices by embedding computing power and their interconnection leads to Mark Weiser’s famous vision of ubiquitous computing (ubicomp), which is widely believed to be the next paradigm in information technology. The mass deployment of pervasive devices promises on the one hand many benefits (e.g. optimized supply-chains), but on the other ha...

متن کامل

New Class of Cryptographic Primitives and Cipher Design for Networks Security

This work focuses the problem of increasing the integral implementation efficacy of block ciphers. It proposes a new approach to the cipher design, suitable to applications, where constrained resources are available to embedded security mechanisms, such as ad-hoc, sensor and wireless networks. The paper develops the cipher design approach based on the use of data-dependent (DD) operations (DDOs...

متن کامل

Hardware Implementations for the ISO/IEC 18033-4:2005 Standard for Stream Ciphers

In this paper the FPGA implementations for four stream ciphers are presented. The two stream ciphers, MUGI and SNOW 2.0 are recently adopted by the International Organization for Standardization ISO/IEC 18033-4:2005 standard. The other two stream ciphers, MICKEY 128 and TRIVIUM have been submitted and are under consideration for the eSTREAM, the ECRYPT (European Network of Excellence for Crypto...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007